pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

How to Create and Configure User Accounts in Windows

User Accounts are the mechanism Windows provides to enable users to log on to a single, specific computer and to control the resources they’re able to access. They allow each user to have their own document folders and settings such as the wallpaper, Start menu, visual style, and so forth. They can also be used to confer a level of data security, by requiring that a user is authenticated (by provision of a valid User Account Name and Password combination) when logging in.

This tutorial will take you through the steps involved in:

  • creating a new user account
  • deleting a user account
  • adding a password to an existing user account

Windows XP Home Edition supports three types of User Accounts:

  • Administrator accounts allow full access to all system resources and permit changes to to be made to other user accounts.
  • Limited accounts allow users to change own picture and to create, change or remove their password.
  • The Guest Account can be activated by an administrator for the purpose of allowing occasional users limited access to the system. 
  • User Account Creation
  • User Account Editing

Hardware Upgrades | PC Maintenance | PC Troubleshooting | PC Customization | PC Leisure


Managing vCard Files for Effective Communication and Branding Optimization

Managing vCard Files for Effective Communication and Branding Optimization

vCard is a file format that is used for digital business cards. There are also vCard editors that allow you to create electronic business cards if you … [Read More...]

Eliminating Common WordPress Vulnerabilities to DDoS Attacks

Distributed Denial of Service (DDoS) attacks are serious threats that every website manager must be prepared for. Unfortunately, some of the most … [Read More...]

Securing Your Privacy Against Deep Packet Inspections

Network administrators, cybersecurity analysts and watchdogs use a variety of different tools to monitor Internet traffic. Deep packet inspection is … [Read More...]

Identifying and Protecting Against the Most Dangerous Keyloggers

Keyloggers are among the most frightening tools in the hands of a skilled hacker. They are malicious devices or malware applications that enable … [Read More...]

Excel Shortcuts for More Complicated Commands

We previously wrote an article on the benefits of using keyboard shortcuts in Excel. The shortcuts we focused on were used for simple formatting … [Read More...]

CleanTalk as Your Weapon against Spam

CleanTalk as Your Weapon against Spam

Are you tired of spam? You aren't alone. It has become a massive epidemic over the past few years. Around 14.5 billion spam messages are sent every … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Removal Guide of Fissa.com Virus

The Fissa.com virus belongs to the category of browser redirecting, it is designed to contaminate computers for the purpose of boosting website’s … [Read More...]

Norton Antivirus 2017 with Antispyware

PROS: Norton automatically updates software virus definitions and tracks suspicious files. CONS: Network and miscellaneous settings are too … [Read More...]

USB 2.0 Intefaces

While USB was originally designed to replace legacy serial and parallel connections, notwithstanding the claims that they were complementary … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors