Disable Shift key when logging in automatically
When using the automatic login function, the user can ignore the login process by holding down the Shift key and enter another username and password to enter the computer. This trick can disable the Shift key feature when auto-login. The steps are as follows: Open the "Registry Editor", find the [HKEY_LOCAL_MACHINE\\Software\\Microsoft\\WindowsNT\\CurrentVersion\\WinLogon] subkey and select it. Create a string value named IgnoreShiftOverride in the right window, and set its key value to 1. Exit the Registry Editor and restart your computer. This way you can't interrupt the automatic login process by holding down the Shift key at startup.
Let others access your computer
Open "Control Panel" → "User Account", then click "Create a new account", then enter another user account name and password in the wizard. Finally choose to set its type to "Restricted" and click the "Create Account" button so others can log in to your computer.
Let the specified user log in only at a specific time
Being a parent may wish to limit the time the child is using the computer. Just follow the steps below and you can do it easily. However, this requires you to have Administrator privileges.
First enter the "command line prompt", taking the Guest account as an example. If you need to set this account, you can log in from 9:00 am to 5:00 pm, Monday through Friday. You can use the following command:
netuserGuest/time:M-F, 08:00-17:00, or netuserGuest/time:M-F, 9am-5pm. It will take effect after the carriage return.
If you need to specify the time of day, then just follow the format:
netuserGuest/time:M,4am-5pm;T,1pm-3pm;WF,8:00 -17:00.
The netuserGuest/time:all command allows the user to log in at any time.
Beware of your encrypted files
Starting with Windows 2000, Windows can help you encrypt files in the NTFS file system partition. To do this, right click on the file or folder you want to encrypt, select "Properties", click the "Advanced" button on the "General" tab of the property, a window will pop up, select "Encrypted content in the window to protect the data. "Encryption of files on NTFS volumes is possible."
Small Tips
This is called EFS (EncryptingFileSystem). The advantage of this encryption is that the encryption process is completely transparent, that is, if you encrypt these files, your access to those files will be completely allowed (you don't need to enter the password because the authentication process is in your login to Windows) It was done at the time, while others could not access or move the data.
However, if your Windows suddenly crashes, you can only reinstall the system if you have nothing to do, but the original encrypted data will not open. At this time, only in the domain environment, you can get help from the domain administrator to decrypt these files. This is because when you use EFS encryption, the system automatically generates a key based on your SID (SecurityIdentifier). To decrypt these files, you need to use this key. For the system, the different users are not distinguished according to the user name, but the SID is unique according to the SID. The relationship between the SID and the username is the same as the relationship between the person's name and the ID number. Although there are people with the same name and the same name, their ID numbers will never be the same; although they have the same username (on the network, because local users cannot have the same username), their SIDs are absolutely different. This explains why you can't open a previous encrypted file even after you reinstall the system even if you log in with your previous username and password.
It is best to decrypt the encrypted data before reinstalling the system. However, in order to cope with a sudden system crash, you need to back up your own key, so that after the system crashes, just reinstall the system and import the key, you can continue to use the previous encrypted file.
The method of backing up the key is: Click "Start" → "Run", enter: certmgr.msc.
Windows XP SP2 gives users the tools they need to improve their critical data and file security leve
As the Internet continues to grow, the demand for IP addresses is increasing, resulting in stricter
hard disk is responsible for storing the data in the computer, so the hard disk is also one of the b
technology is advancing, thinking is developing, and the patterns on the web page are of course goin
The "murderer" that caused the notebook to slow down is exactly who
Only two laps to speed up Windows XP startup speed
Font Download: Handwritten Fonts in Web Design
Seven tricks to avoid illegal intrusion without hacking broilers (2)
XP system prompts 2345port.sys blue screen how to solve?
Automatic update of Windows XP system cannot use
14 strokes security settings to prevent invasion of hackers (1)
Share the experience of Tencent's micro cloud space to 10T
Hacking offense and defense: the most insidious seven black skills (3)
Win7 system taskbar display desktop icon is gone, how to do
How to set the win10 system group policy to set the default behavior of automatic running?
Win7 system under Baidu cloud network disk offline download resource prompt error 36000 solution
Win10 new Spartan browser new details exposure: to provide users with a new online experience
Wps office 2012 pre-release version The latest official release
Edit the Chrome for iOS default search engine
Introduce more hardware vendors to join the Windows Phone 8 camp