How to create multiple user accounts on one PC. Using additional programs

The easiest way to access two different accounts Dropbox - download the application for the main account, and enter the additional account through the browser. The web version of Dropbox will give you access to all the files in your secondary account, and will also allow you to use the basic functions of the service, such as uploading files and creating folders.

Of course, this method is not very convenient. In addition, you lose synchronization in background. But if you need to use an additional account only occasionally, then this is the easiest solution.

Use shared folders

The downside to this approach is that Dropbox doesn't allow sharing of the root folder. You will need to place all files in a shared folder that will take up space on both accounts. Get extra space in this case, it will not work, but you can avoid trouble with your personal and work account.

1. Create a second Windows user(if you don't already have one). If you're only creating this account to bypass Dropbox restrictions, don't link it to a Microsoft account.

2. Sign in to an additional account Windows entry without leaving the main. To do this quickly, just click Windows buttons+L.

3. Download and install the Dropbox for Windows app. To log in, use the username and password from the second account.

4. Return to the main Windows account and go to the "Users" folder. By default, it is located on the same drive as the operating system.

5. Then go to the folder of the user you just created. In the window that appears, click "Continue" to access your files with administrator rights.

6. Go to your Dropbox folder. For convenience, you can create a shortcut to this folder and place it on your desktop.

Please note that in order to synchronize your account with the Dropbox server, you will have to sign in to a secondary Windows account each time, and then return to the main one again.

1. First, make sure you've downloaded, installed Dropbox, and signed in to your main account.

2. Then create new folder Dropbox in your personal Home folder. For example, let's call it Dropbox2.

3. Open the program (use Spotlight in the top right corner if you can't find it). Click Process, then Select.

4. In the "Library" submenu, scroll down the page until you see the entry "Run shell script". Drag the entry to the right window.

5. Copy the script below and paste it into the text box. Replace Dropbox2 with the name of the folder you created earlier.

HOME=$HOME/Dropbox2 /Applications/Dropbox.app/Contents/MacOS/Dropbox &

6. Now click "Launch". A new copy will appear Dropbox apps, which will allow you to log in to an additional account and set it up.

In a corporate environment, each employee has their own account, but at home, family members often use one account for all. If no one ever approaches your computer except you, there is no need to create multiple accounts. But if at least sometimes your relatives or friends, for example, access the Internet from it, it is better not to provide them with your account for this.

Today you will learn seven reasons why each family member should have their own account in Windows 7. You will see and hear in the podcast why it speeds up the work of all users of the system, and also get acquainted with different ways to control them.

1. Familiar programs and predictable system operation

Do you think it can confuse a person who is used to Windows media player, the interface of AIMP or VLC players, despite all their wonderful advantages? And are you sure that Grandpa needs Opera, which you have changed beyond recognition, as the default browser?


photo credit: jonrawlinson

A friend of mine could not figure out where the files downloaded from the Internet were saved. The thing was that the download manager installed by my son intercepted them and saved them to the specified locations. Unfortunately, the son forgot to tell his mother how to save files to the desktop. Common situation?

There are many such examples, but not at all in order to laugh at a person who does not know how to work with a download manager. The moral is that when people with different levels of Windows proficiency use the same account, the less experienced user always ends up on the losing end.

Separate accounts provide comfort to you, while simplifying the work in the system and programs for other family members.

In addition, you show respect to all users of the system, because. they don't have to work on your terms. They will reciprocate if you make their work in Windows clearer and more convenient.

2. Quick and easy access to your files and data

When your files and data are at hand, the speed of work in the system invariably increases.


photo credit: Mariano Kamp

Due to separate accounts, each user works faster, because their own are available:

  • current documents
  • favorite files, folders and searches
  • bookmarks and browser history
  • labels desired programs etc

If in one account different people use the same browser, there are inconveniences in the form of someone else's history, bookmarks and searches, not to mention home page and remembering passwords to sites. In the same way, it is inconvenient to use two Skype accounts or any other communication program in one account, because. You have to log out and enter your username and password all the time. There are no such problems with individual accounts.

Windows 7 and almost all programs remember the last folders and files you accessed. In the operating system, these are jump lists, recent places and search history, and in programs - the File menu and recent open folders in the "Open" and "Save As" windows.

Navigation is greatly simplified when you work only with your history of files and folders, i.e. the speed of work in the system increases without any upgrade of iron.

Search also works within your account, and no one will be disturbed by other people's documents, pictures and media files. However, home collections of movies and music are logically placed in shared user folders. In this case, they are automatically included in the standard libraries. Thus, each user will be able to find both their own and shared files search in the library.

The location of the desktop and taskbar elements also plays a huge role in the speed of work - everything should be in its place, from desktop shortcuts to programs in the taskbar and notification area.

This is rarely achieved with joint work in one account. I have seen more than once how files are accessed through the “My” folder on the desktop or in the root of the disk. But after all, this does not involve libraries and user folders, which give a gain in the speed of working with files and documents.

3. Appropriate decoration

Since we are talking about the desktop, you can not go past the design of the operating system - this is wallpaper, color scheme, sounds, etc. Some people prefer to see a flower on their desktop, others prefer anime framed by the dark colors of windows, and still others prefer wallpaper with Ferrari and Windows design in red tones.

Working in a system designed to your taste is as pleasant as sleeping in your own bed. And you don’t have to go to a fortuneteller or sociologists to see a direct connection between comfort and high productivity.

In addition to comfort, do not forget about the so-called special features. So, people with low vision may need a contrasting theme, or an increased font size in windows. A separate account in this case is simply necessary.

A few words about passwords

Sometimes the idea of ​​using separate accounts is frowned upon, even if it helps root out the problem I'm being asked to fix. The traditional argument in this case is: "We have nothing to hide from each other!" Since computer problems should not bring discord into the family, I usually answer: “Then do not put passwords on accounts!”. This way you can get all the advantages of separate accounts outlined above, and without the slightest hint of secrecy.

If you need to control users, passwords are indispensable (at least for administrative accounts). And then we will just talk about protecting data and the system, as well as control over its users.

4. Protection from playful hands

If you're reading this article, you're either the most power user in the family, or you aspire to be. To do this, you need to be the administrator of the home system, and not just have full rights, but ensure its stable and secure operation.

With a high degree of probability, this means that your household should work with ordinary rights. And so that they do not need administrator rights, you are responsible for the timely installation of all the programs they need and the configuration of system settings. Yes, yes, what did you think?

In Windows 7, administrator rights are actually required only to install programs, drivers, and system settings. With limited rights, it is quite comfortable to spend time on the Internet, download files, communicate in all sorts of ways, listen to music, watch movies, etc.

By becoming the only user with full rights, you exclude the option of losing control over the system due to the fault or oversight of your household and guests.

Change system parameters and files they will not be able to, and in case of infection malicious code will not advance beyond their profile, which is easy to fix.

Start by creating a regular account for each family member, and add another limited account for guests.

For friends and acquaintances, you can use the Guest account, but I do without it. If you still decide to go this route, set a password for the guest account. For this in command line running as administrator, run net user guest* and enter the password (to remove it, repeat the command and press Enter twice).

5. Privacy

In addition to protecting against playful hands, individual accounts also save from prying eyes.


photo credit: fmmr

Firstly, the issue of delimiting user access to folders and files is automatically resolved. In the OSZone forums, the question “How to put a password on a folder?” regularly pops up. There is no need for a password if you have separate limited accounts created on the system. In this case, regular users do not have access to each other's files, nor to the administrator's folders. However, if you are moving user folders to another partition, you will need to manually set permissions.

Secondly, you don’t have to worry that any activity on the Internet will catch the eye of the household, whether it’s visiting websites or exchanging messages. All this information is stored in the profile and is not available to other users if the accounts are protected by passwords.

If you want to further protect your personal data, you can encrypt it. There are a lot of programs for this purpose (I use TrueCrypt open source).

6. Parental control

Separate accounts provide an excellent springboard for control over the users of the system. When parents think that the child needs to sit at the computer and / or on the Internet less, or want to prohibit visiting “bad” sites (from home :), parental control comes to the rescue.


photo credit: Cath Schneider

This feature is included with Windows 7, and in addition to it, Microsoft also offers the Windows Live Family Safety program. However, not all problems can be solved by these means.

So, if you want to allow access to the Internet only during certain hours (say, from 16 to 21), Microsoft tools will help you. But if you want to limit your total Internet time to three hours a day, you'll have to use third party programs. This task is successfully handled, for example, by the Kaspersky Internet Security package.

Each program in this area has its own opportunities and proprietary technologies. For those who are interested in this topic, I recommend a comparative review of parental control programs, which was published on his blog by Vladimir Bezmaly, security MVP.

7. Non-child control

If you are happy owner editions of Windows 7 Professional or Ultimate, your control over users is greatly expanded and becomes more convenient.


photo credit: Ev0luti0nary

Thousands of options at your disposal group policy, provided with an editor (gpedit.msc), while home editions have to use the registry. In Windows XP Professional, local group policies applied to all users, including administrators, so you had to take extra steps so as not to limit yourself to your loved one. On Windows 7 and Vista, this is not a problem because multiple Local Group Policy Objects can be involved. This allows you to apply policies to groups of users (for example, to all non-administrators), and even to selected accounts.

In Windows 7 "Ultimate" with new technology AppLocker can control what programs users on your system can use. The standard scenario is to use the list of allowed programs and prohibit the others from starting. Unlike politicians limited use programs, you can set up your own rules in AppLocker for various users. available on the OSZone website.

Leave no loopholes

Hard control is only good when a limited user plays by the rules. If he is seriously preoccupied with the issue of increasing his rights, then you won’t have time to blink an eye as this happens. So, it's as easy as shelling pears to create an administrative account by booting from the Windows 7 installation disk or from some LiveCD. After that, you can give the necessary rights to your account and do whatever you want in it while you rest on your laurels.

To protect yourself from a particularly "advanced" user, you need to set a ban on loading from optical and removable media in the BIOS, as well as set administrative BIOS password.

In especially severe cases, you will have to seal system unit or laptop. If the seal is broken, it is worth thinking about other educational measures, or about buying a separate computer for a person - let him learn to be responsible for his system.

How is your system organized?

If you're not the only user on your computer, tell us how you've managed multiple users. Are there separate accounts for all family members or do you all use the same account?

You may have already tried to create separate accounts, but faced a certain problem and abandoned this idea. In this case, tell us what was the insurmountable obstacle to working with individual accounts. It is possible that the problem has a solution!

Podcast

Since today's material does not contain any instructions, I thought that it can be not only read, but also listened to. I bring to your attention a podcast lasting 13 minutes.

Perhaps some of you will find this form of presentation more convenient. I will be glad to read your feedback in the comments.

You can mark fragments of text that are interesting to you, which will be available via a unique link in the browser's address bar.

about the author

Andrey

Thanks Vadim!
I will definitely keep the link for friends and acquaintances. And then few people trust me, as a person with two years of experience.

Andrey, you need to put into practice, and not throw links. Then you will see the benefits yourself :)

Morpheus

In general, I liked the new form of presenting the material! In my picky opinion, there is too much information for a podcast, it turned out to be too long.
After 2 hours I understand that not everything was assimilated and remembered. I will read, so I remember better.
It would not be superfluous to mention that if the program provides a choice, install it for one user or for all, then you need to think and choose the right option :)
“And are you sure that Grandpa needs Opera, which you have changed beyond recognition, as the default browser?”
:))
About experience: on a home computer there is Punto Switcher- the weight is convenient, but for an inexperienced user, switching is not always clear. The text was clogged, where there are many abbreviations for “pieces” - 20 pieces, 40 pieces. etc. The ambush is that it is necessary to put a dot, otherwise "piece" turns into "in". I was remembered for a long time :) Then I had to show the back switch button and remind the rules of abbreviations :)

Morpheus thanks for the feedback. This podcast is actually reading the article aloud. There is a lot of bukaf in the article, and it is possible that some things are better perceived by ear. As for the length ... yes, it turns out "a lot of sloph" :)

But I see there is a significant difference from the videos, the brevity of which I consider very important. The podcast, in general, is not designed to be listened to on a computer. Rather, it's to be played on mobile device(for example, a smartphone) on the way somewhere - in a bus, subway, traffic jam :) In other words, a podcast is essentially closer to an audiobook.

The hardest thing is to beat the monotony. Ideally, it would be nice to voice in two voices for a change, in the form of a dialogue. But I decided not to scare the listeners with my falsetto;)

Morpheus: if the program provides a choice, install it for one user or for all, then you need to think and choose the right option :)

Yes, but by default, all modern programs are installed for all users.

But the example with punto is very indicative :)

Sergey

Thanks Vadim. The podcast idea is a good one. :)
I think if the article is long, then in the podcast you can state it more briefly (describe the main points, etc.), leaving a detailed description for the article. Those. I listened to the podcast, found out what it was about and actually read the article for details. :)

About the experience: At home 2 laptops and 1 PC. Connected to wireless network using a WiFi router.
One laptop is my personal, to which only I have access. Another one for my sister. And the PC is shared, on which 3 accounts (UZ) are created: mine (admin) and 2 user accounts. For convenient administration, a group has been created, which includes the UZ of the family. All my files/folders are available only to me, including some of the programs that only I use.
For example, the movie folder is open general access only for reading/execution, as well as for creating folders/files there, but the user cannot delete anything.
Pre-configured ultrasound for convenient operation: in the start menu, removed unnecessary items, disabled autorun for all media, configured the browser (for downloading, set a specific directory without asking the user, which avoided questions - Where should I save it? or Where did it download?), Created the necessary shortcuts to folders on the desktop and programs, etc.
In general, he did everything possible so that nothing distracted the user.
As for the BIOS, I did not set a password for it, because. no one else works for a PC, and even more so does not know about its existence)

I connect to the PC using Radmin if I need help with a problem or via remote desktop (I made a terminal server from Windows 7 Ultimate) for some of my tasks so as not to disturb anyone (if the PC is busy).

I consider the creation of separate UZs to be an extremely necessary measure, otherwise confusion may arise in the future, and it’s safer that way.

Sergey, I kind of wanted to shorten the podcast at first, but I never figured out how to throw out a word from the song :)

Thank you for the detailed response on the topic of the material! The idea of ​​having read-only access to an existing media collection is a good one, insuring against accidental deletion. Just like the thought presetting systems for users. The system "out of the box", indeed, can cause inconvenience to users in the form of questions that they do not know how to answer (often, they simply do not read them well).

But there is an interesting point here. Customizing the system from the height of your experience, sometimes you can deprive users of convenient features. You mentioned disabling autoplay. If this is Windows 7, then it would be more accurate to talk about autoplay (autorun is architecturally disabled in it). I also turn it off, but at the same time I noticed that for some users it is simply necessary. Let's say they insert an SD card from the camera - the system immediately offers to copy the photo. Otherwise, they need to open the explorer, find there desired disk- the whole thing. The same with music CDs - you can immediately play them in WMP without thinking about anything.

The situation is similar with downloading. Yes, you set up saving without prompting, but you still have to train the user. This is the job of a home system administrator. What am I getting at :)

Sergey

Vadim Sterkin, I agree about the setting from my own experience. Several times I caught myself trying to set it up in my own way when installing / configuring the OS, but stopped in time)
Perhaps I’ll turn on autoplay for music / movies, flash drives, probably too, they work more often with them.

I teach as much as possible. :)

Sergey

Good article, the music is relaxing…………Thank you Vadim..)))) I will be glad to see the next news and articles with sound accompaniment..)))

Sergey, I'm glad that you liked the music, because I tried to pick up something that is not annoying:) This is Jap Jap, listen again :)

ProFFeSSoR

Not a bad article, on the one hand the truth is capitalized, on the other hand, repetition is the mother of doctrine!

I also have separate accounts on shared computers, just like you. this helps at least customize the system interface as you wish (for example, I have the Start panel located on top, which is inconvenient for most users). There is also a separation of access rights to various folders, and hard disk quotas. In Windows 7, this is conveniently implemented. In principle, I no longer use any special protection measures, but my relatives do not suffer from the installation of programs and other things, so there is no need for more IMHO.

ProFFeSSoR thanks for the response! The truths may be uppercase, but they are not obvious to everyone :) For example, in the general account of the association of file types, say, the default browser brings people to the point that they copy the link from the messenger and paste it into their browser, otherwise it will open in friend.

On the other hand, quite recently a man wrote to me, desperate to defeat his son in a war on the field parental control. The boy raised limited rights in a way unknown to dad.

And your example with disk quotas is very interesting. I did not think that this is applied in the home environment ... Apparently, there were precedents :)

vladsyss

I'll tell you why not say :) One computer, 3 users (me, wife, daughter), one account with admin rights, no problem. For the convenience of surfing my daughter on an Internet, I installed netpolice (this is a filter for convenient non-viewing of frank erotica). I understand that with one slight movement of the hand, a wife or daughter, rather a wife, can demolish everything. Well, there will be something to do on long spring (summer, autumn, winter) evenings.

vladsyss thanks for the response!

vladsyss: 3 users (me, wife, daughter), one account with admin rights, no problem

ABOUT possible problems is discussed in the second half of the material, but the first three reasons are devoted to faster and more comfortable work. Do you see any advantages there?

vladsyss

Vadim Sterkin: vladsyss thanks for the response!
Possible problems are discussed in the second half of the material, but the first three reasons are devoted to faster and more comfortable work. Do you see any advantages there?

I see pluses, I completely agree that accounts for everyone are cool, accounting is not required. admin - this is a ruler, but in my case it historically happened, besides, the situation is like in a joke about three cats, but he has a beard, I won’t retell, otherwise they will beat him.

Basil

Hello. But what to do ordinary user with such games that strictly require you to run yourself as an administrator (for some reason, launching using the scheduler does not work)?
An example of such an application is Innova's Launcher.
Thank you.

Basil, this is one of the questions that I was expecting :) The problem exists, but solutions are also possible.

First, you need to find out if the program really needs full rights. Sometimes she requires it unnecessarily, and RunAsInvoker will help.

Secondly, it is possible that the program only needs write permissions to certain folders. They can be issued.

For more information about these two options, see the beginning of the comment.

The recommendation is very relevant for all users. Such an organization really justifies itself, even when one user works:
1) one entry - with administrator rights - for updating the system, etc. similar-responsible;
2) the second is limited and therefore, as well as possible, suitable for surfing the Internet, or playing games, etc.

Vladimir

“Perhaps you have already tried to create separate accounts, but faced some problem and abandoned this idea. In this case, tell us what was the insurmountable obstacle to working with individual accounts. It is possible that the problem has a solution!”
Once on a cart (computer) there was one AXIS. 2 accounts were created: mine and son, both admins. For him, a computer is a toy, for me, study, work, etc. So, as the son only played on the computer, respectively, his account was indestructible. Mine, on the contrary, has seen programs installed for one-time work more than once. Plus, trying to somehow figure out the OS, I picked it immeasurably. Due to these reasons, after 2-3 months, my accounting began to slow down not childishly :). I tried to repair it: both manually and programmatically (CCleaner), but this did not always help, and reinstalling the OS for one always entailed the creation, configuration, etc. accounts of another. Therefore, it was accepted (by me) Solomonic (ha, I would like to believe that this is exactly so) decision: each has its own axis. That's where we're at right now :)

Vladimir, to be honest, I don't see an unsolvable problem for you :) For experiments with the OS and one-time programs, it is logical to use virtual machines.

But if the problems started in a specific account, then you can simply create a new one. It's easier than putting new system:)

Celsus

Familiar programmer, experienced user. There are 3 W7 systems on his computer, one is 64 bit. All 3 were infected after his mother surfed the Internet with the NESHTA virus. Since a friend had UAC turned off and there were administrative UZs. I have nothing to do with programming, but I advised him to enable UAC and remove letters in each OS system drives other OS.

On my home laptop, this is the setup:
On the Internet, you have to work under a regular account, with UAC enabled (I don’t want the banner to disable DZ or the registry). Access to partitions on which favorite files and files that can become infected, as well as other 7ka and even XP SP2 HE, are hidden from the "Internet" seven. Its customized image is made, if it "flies" - I will restore it in 10 minutes.

Some use a virtual machine as an isolated environment. That is, they have the Internet in a virtual machine, from which there is no access-window to the real system (partitions are not “shared”, but have their own virtual partitions), I don’t know, can they do that too? In addition, you can simply make a copy of the virtual system file before accessing the Internet in order to delete the infected version in case of infection. What are the dangers in such an approach?

Celsus, in my opinion, the virtual machine is inconvenient for everyday work. If you want to make the partition with 7 inaccessible from under XP, you can go this way http://support.microsoft.com/kb/926185/en

As for protection against the launch of unauthorized applications, you can apply AppLocker (in Ultimate). They created a white list, the rest was banned and that's it :)

Andrey

Very interesting article, thanks Vadim. On a laptop, I made separate accounts for myself and my wife. But on the computer it doesn’t “work out”, the wife says “why do I need it, it’s more convenient for me” and it’s hard to explain to a person that not only is it safer, it’s also more convenient (thanks to the flexible configuration of libraries and the desktop). I just can’t think of convincing arguments in favor of separate accounts :(. There was a question, Vadim, with UAC enabled, when launching applications (for example, qip, which boots with the system), a window pops up asking if you really want to run this application, I would like to find the setting , to this question did not occur to the system about certain (frequently used) applications. Thanks in advance for your reply.

Andrey thanks for the response!

Andrey: the wife says “why is this necessary, it’s more convenient for me” and it’s hard to explain to a person

Why explain anything? Everything is simple here:
1. Create a new account for yourself.
2. Transfer there all the necessary settings and files from the old one (start - search - data transfer tool)
3. Lock your account with a password and don't forget to log out when you're done.

Nothing will change for your wife in terms of working in the system. You can even set it to auto-login, and use SHIFT on boot to log into your account.

Andrey: a window pops up asking if you really want to run this application

If this question means a UAC prompt, then I'm not sure why this is happening. In theory, QIP should work fine with normal permissions, unless it's run in compatibility mode.

Standard way launch applications with full rights without UAC request described .

Andrey

Vadim Sterkin: The standard way to run applications with full rights without a UAC prompt is described here.

Thank you very much for the answer, sorry for not using the search, but I did not know how to correctly specify the query :)

Vadim Sterkin: For your wife, in terms of work in the system, absolutely nothing will change. You can even set it to auto-login, and use SHIFT on boot to log into your account.

I have long heard about such a button (which allows you to “see” user accounts when windows “autoruns”), but did not know that it was Shift.

Vadim Sterkin: If this question means UAC prompt

That's why the google search did not give results, as they say "the question is not posed correctly."

Vadim Sterkin: In theory, QIP should run normally with normal permissions, unless it is run in compatibility mode.

The standard way to run applications with full rights without a UAC prompt is described here.

Should, but "for some reason," he asks. Although Skype launched in Windows Vista compatibility mode is "silent".
And one more “off-topic” question (I just didn’t know where to write) when you go into hibernation mode, after a while, the computer hangs and does not wake up when you press keys (mouse and keyboard) or press the power button. At the same time, an impression of “inoperability” is created (the coolers are silent, the hard disk is de-energized, the activity indication does not manifest itself). Windows has a power saving mode configured: fall asleep after 15 minutes (mixed sleep mode is allowed), go into hibernation after 17 minutes. In bios sleep mode is S3, ACHI mode soft-on. I've been suffering for a week now, no one can say anything specific. In order to “wake up the sleeping beauty” after freezing, it is necessary to simulate the loss of energy (I forgot to say the PC is connected to the UPS), that is, turn off the UPS and wait 60 seconds (a shorter waiting time did not give the desired result), then start the computer (then the system is restored after hibernation ). Sorry if I’m writing in the wrong place, I didn’t find an answer anywhere, but I don’t want to reinstall the system.

Andrey, for the answer - please. I am glad that you will learn something new from my blog :)

QIP can be set to a profile, then in theory it won’t ask anything, unless it’s completely crooked app. Of course, with several accounts, each user will have to install it this way ...

As for off-topic questions, there is a forum for them. In particular, there is a separate topic for your problem: Hibernation, sleep and hybrid sleep in Windows 7 (all questions)

Vladimir

Vadim Sterkin,
About Wirth. I thought about cars before, I installed them, and now I install them for picking in the OS. The only thing that's annoying is that it slows down due to the fact that Wirth. The machine is allocated one processor. The second problem is that sometimes heavyweight programs are installed: Arhikad, Arkon, and they require unlimited resources, which the virtual machine simply cannot provide :(.
Regarding deleting the old account and creating a new account instead of the old bugged one, this thought came to my mind a second before I finished reading this for the second time :). The first one somehow slipped through.
So, it turns out, you need to read, thinking about what you read :))).

Today, many families already have a PC. At the same time, there is usually only one computer, and all family members want to work on it - children, parents, and even grandparents.

At the same time, children most often want to play and communicate via the Internet, and parents often need a stable PC and the safety of their data. Therefore, it becomes necessary to configure the PC for the work of several users.

The purpose of this setting is: separation of user access to files, folders, programs.

I will simply divide users into parents and children.

Depending on the importance and type of data that users work with, I will highlight the following ways to achieve this goal:

1. Installing multiple operating systems.

This method is best used when the importance and complexity of the data is very high, for example, when working with databases based on MS SQL Server or Oracle.

Different OSes are installed on different disks (disk partitions), users are configured in these OSes, users choose their own OS when starting the PC.

2. Usage additional programs.

In this case, one OS is installed on the PC, and software is additionally installed to hide data.

Examples of such software: BestCrypt, Hide Folders, Folder Lock, Kaspersky KryptoStorage, 1 Click & Lock.

As a result, access to folders and files can be restricted with a password, but if the encryption program fails or the password is lost, there is a possibility of permanent data loss. Most of these programs are paid..

3. Use of virtual machines.

Virtual machine- This special program, which creates a "PC within a PC".

The user has the ability to configure multiple operating systems (virtual machines) to work.

This method requires a fairly powerful PC, because. virtual machines use real resources - processor, memory, HDD; the user receives two or more concurrent operating systems at the same time.

Files virtual machine on a real OS, they are a single file, and cannot be accessed without running a virtual machine.

4. Set up multiple users on the same OS.

In this version, several users are configured in the OS, then different rights are given to users, and the desired user is selected when the OS starts.

The first method requires deep system knowledge about the OS, the second is quite risky, the third requires a powerful PC (which not everyone has), the fourth is the easiest for most users.

In this article I will tell you how to configure the operating system Windows XP Pro for multiple users.

IN operating systems families Windows, starting with NT, there is a concept "Account".

Account is designed to identify the user and determine his rights in the OS.

When the user is alone, usually when the OS starts up, a welcome screen is visible, and then the desktop immediately appears. The user thus has all rights in OS. In this case, the user logs into the OS under the built-in account administrator.

To set up multiple users, you need to create multiple accounts. To do this, you need to run the console " Computer management».

Also, users can be configured through the utility " user accounts", which is launched from the Control Panel, but I believe that the console " Computer management» has more customization options.

You can start the console like this: click right click mouse by icon "My computer" and select from the menu that appears "Computer Management" or through "Start" - "Settings" - "Control Panel" - "Administrative Tools" - "Computer Management".

Expand the branch in the left window « Local Users and groups"(the “Utilities” branch is usually expanded) and select the folder "Users" as shown in the picture below:

Now the OS user accounts are visible in the right window. In this example, there are 5 accounts. By double click The properties window opens for the account.

The following picture shows the "Guest" account properties window.

Account « Guest» designed primarily to provide minimal access to PC resources over the network.

Entries « SUPPORT» And « HelpAssistant» designed for help and support services.

Recording « ASPNET» designed to run some system programs.

Recording « Admin» - this is a built-in administrator account, usually after installing the OS, the user boots under it. Depending on the version (build) of the OS, this entry may also be called " Administrator" or " Administrator».

On the General tab, you can specify the full name and description of the account, as well as configure some account password properties.

I will give a simplified description and purpose of these properties.

Require user change at next login.

If this checkbox is checked, then the next time you log in, the OS will ask the user to change the password.

This property is supposed to be applied as follows: the system administrator creates a new account with some standard simple password, such as "12345". Then the user, when logging into the OS under this new account, changes the password to his own.

As a result, it should turn out that only the user himself knows the user's password, while it is recommended to use a password of at least 6-8 characters, containing upper and lower case letters, numbers, special characters.

This feature is designed for conscientious users who understand the importance of information security and strive to ensure high level security.

Prevent the user from changing their password.

This checkbox during installation prohibits the user from changing the password on their own. This property should be used if users are not conscious and want to change complex password, issued system administrator, to a simple password.

The password does not expire.

If this checkbox is not checked, then the user needs to change the password periodically. The default password expiration date, if I'm not mistaken, is 42 days. If the password has expired, the entry is blocked.

Disable account.

This checkbox is needed when disabling an account. The entry remains in the OS, but does not work. This is used, for example, when a user goes on vacation, his entry is disabled, and no one can log into the OS on behalf of this user, and after returning to work, it is enabled again.

In my example records are disabled « Guest», « SUPPORT" And " HelpAssistant» . In the list of accounts, they are marked with a red circle with a cross.

Block account.

This checkbox is needed to unlock the entry. The user can only remove it. If the account is blocked for any reason, then a checkmark appears in this field, and to unblock the account, it must be unchecked.

A similar description of the fields of this window can be read through the built-in hint. To do this, click the "Question mark" icon in the upper right corner of the window, the cursor will change to suggestive, then move the cursor to the desired field and click again. A tooltip window should appear with a description of the object.

Create a new account.

To do this, in the window "Computer Management" select branch "Users", then select from the menu "Action" - " New user» as shown in the picture below.

A window to create a new account should appear. It must be entered Username, maybe even in Cyrillic.

You can optionally enter a full name and description, these fields are more used in organizations with many users.

After the name, you must enter the password 2 times in the fields "Password" and "Confirmation".

This is done in order not to make a mistake when typing the password. If the password and its confirmation do not match, then a message about this will appear during creation.

At the end of the settings, click the " Create". After that, the system will create a user and offer to create the next one. If necessary, create the next user, if not, then press the button " close».

Thus we create accounts for all users. In the example, I created the entries " Parents" And " Children».

On your PC, you can create users for each family member. If there are several users, then I recommend creating your own account for each, and using the built-in OS administrator account only in case of problems.

After that, you need to create or change a password for the current administrator account.

To do this, select the entry in the right window « Admin» , then select from the menu "Action" - "Set password".

In this case, the OS will issue warnings about the consequences of such an action.

If you are an advanced user and use file encryption, personal certificates and/or other means of security, then the password must be changed/set in a different way.

For novice users, you must agree and set a password. The password must be entered twice to avoid typing errors.

ATTENTION!!!

WHEN ENTERING PASSWORDS, BE SURE TO FOLLOW THE CURRENT KEYBOARD LAYOUT AND BUTTONSCAPS LOCK And NUM LOCK!!!

ALSO DISCONNECT PUNTO SWITCHER!!! (if installed)

Very often, I encounter the fact that users forget about the layout and change the password in the Russian layout, and then when they enter the OS, they try to type it in English.

The same goes for the CAPS LOCK and NUM LOCK buttons.

And PUNTO SWITCHER can change the layout in the middle of typing a password (I have come across such cases).

In this case, the password is entered incorrectly, the user cannot log into the system.

Those who encounter this for the first time often get lost and think that they have broken their PC or Windows and start to panic.

If the password does not match when entering the OS, check the layout again, the CAPS LOCK and NUM LOCK buttons, and try to enter again.

If the OS does not set (by default) a limit on the number of unsuccessful attempts, then the password can be entered an infinite number of times, and if it is set, then the entry is blocked after a certain number of unsuccessful attempts.

To do this, click "Start" - "End the session" - "Change user".

After that, you should see something like this picture (a part of the screen is shown so that the clarity of the inscriptions does not disappear during compression):

In the middle of the screen there is a hint "Click on the username to get started", at the bottom left there is a button "Turn off the computer".

On this screen, the PC user is prompted to select their account (you can hover and left-click) and enter a password.

If you end the previous session in "Start" - "End session" - "Change user", then the programs of the previous user will work - this can be seen in the line under the name - "Running programs: 4".

And if through "Start" - "End session" - "Exit", then all programs started by the user will exit.

System programs The OS, as well as programs running as system ones, such as antivirus, continue to work when changing users.

This is convenient to use when you need to quickly boot the OS under a different user.

If suddenly, when loading the PC, the record "Administrator" will not be visible, then press the key combination Alt + Ctrl + Del, a window should appear for entering a name and password.

It should be typed accordingly "Administrator" and the correct password, after which this entry will be loaded.

On subsequent downloads, the name "Administrator" will already be in the correct field. On my PC, this happened a couple of days (and 4-5 reboots) after setting up new users, and I press the Alt + Ctrl + Del key combination twice to bring up the name and password entry window, although once should be enough.

Try logging in as each user to verify that the password is correct and that user profile folders are created on disk.

Profile folders are folders in " C:\Documentsand Settings\».

After verification simple passwords, try to create more complex ones that suit you and check them out.

You must create different passwords for all users.

After creating and loading a new account, the user will see shortcuts on the desktop for programs that have been installed for all users.

Some programs have a choice during installation: "for all users" or "for the current user".

New users' desktop settings will be created "by default", but each user can customize it to suit their needs.

In the OS under consideration, all users are divided into groups, depending on what kind of work they perform. The OS already has built-in groups, as shown in the picture below.

OS users can also create other groups if they are members of the OS administrators group.

Working with groups is useful in organizations with many users.

For example, a shared folder with files for some department is created, access to this folder is allowed to a group of users.

When entering or leaving a department, the user account is added or removed from the group, and nothing changes in the folder properties.

Similarly, if you need to open access to a folder for the entire department, then access is opened for the entire group, and not by enumerating all the necessary users.

In the case of a home PC, there is no point in creating new groups, because. few users.

When you create a new account, it falls into the group " Users". This is enough to run programs, work with documents, the Internet.

You must be a member to install and configure programs. admin groups.

Initially, users do not have access to the profiles of other users, when they try to access the OS will display a message, as shown in the picture below.

In this example, the user " Children"trying to access the user's profile" Parents».

User " Parents» must be added to the administrators group.

To do this, join the group " Administrators”, double click, the window “ Properties: Administrators».

There is a button on the bottom left Add", you have to press it.

After that, the window " Choice: Users».

In it, you need to press the button " Additionally» bottom left.

A user search window will appear.

In it, you need to press the button " Search» on the right in the middle. Then find the account in the list "Parents", select it and click " OK».

In the window " Choice: Users” a line like this will appear:

"MICROSOF-9960C1\Parents".

The first part is the name of the PC, the second is the name of the entry.

After that you have to press " OK».

As a result, the window Properties: Administrators” should look like the image below.

Click " OK” and we get that the user “Parents” can view the profile of the user “Children”, but not vice versa.

As a result, the user "Children" cannot, without the use of special system methods and programs to modify files in the "Parents" user profile.

If you need to install new programs or games or remove old ones, this can be done from the "Admin" or "Parents" user.

If the program or game after installation does not create shortcuts and / or groups of shortcuts for the user "Children", then you need to place the launch shortcut for this program in the folder " C:\Documents and Settings\Children\Desktop\”, the user “Children” will see this shortcut on their desktop.

How to set up access to a folder on another partition / drive, I will tell in the next article.

Article author: Maxim Telpari
PC user with 15 years of experience. Video Course Support Specialist Confident User PC", having studied which you will learn how to assemble a computer, install Windows XP and drivers, restore the system, work in programs and much more.

Make money on this article!
Register at affiliate program. Replace the course link in the article with your own affiliate link. Add an article to your site. You can get a reprint version.

Personal Microsoft accounts and Office 365 work or school accounts cannot be combined, but they can be used side by side.

Choose one of the options below to get The best way sharing personal and work or school account.

Add a OneDrive for work or educational institution on Personal Computer

You can use OneDrive to sync work, school, and personal files with your computer. You can work with files directly on your computer and access them even when you are offline. Any changes made will be synced as soon as you reconnect.

Adviсe:

    You can also use this approach to add your personal OneDrive to an existing OneDrive for Business account.

    Your personal and work or school OneDrive edits are saved separately.

Add shared work or school folders to your personal OneDrive

When someone grants you access to a folder and permission to edit it, you can add the shared folder to your own OneDrive to make it easier to work with and edit the contents of the folder. If you sync a folder on Windows or Mac computers that are running the OneDrive app, you can work with the folder offline.

Advice: Shared folders added to your OneDrive don't use OneDrive space. Only the disk space of the folder owner is used for data storage.

Adding a work or school Email to Outlook.com

If you want to use your new email address with your existing Outlook.com account, follow the instructions in this article to create an alias. This will give you a secondary email address that uses the same account settings, inbox, and contact list as the primary email address. You can decide which address to send emails from, or you can sign in to your Outlook.com account using any of your nicknames - they all share the same password.

Adviсe:

    You can't add an alias that's already associated with another Microsoft account.

    You can't add an email address already associated with a work or school account as an alias. additional information are listed below.

    The alias and email address can only contain letters, numbers, periods (.), underscores (_), and hyphens (-). Spaces and other special characters are not allowed.

As follows from Art. 313 of the Tax Code of the Russian Federation, tax accounting should be understood as a system of generalizing information for determining the tax base for a tax based on the data of primary documents grouped in accordance with the procedure provided for by the Tax Code.

Formally, accounting and tax accounting are different, but "traditional" accounting has a function that ensures the relationship between these two types of accounting activities. This function is reduced to the timely formation of reliable and complete information on taxable indicators, which can be confirmed during the audit of primary documents, registers and financial statements. Therefore, despite the difference in the purposes of accounting and tax accounting, we can say that they have a common methodological base: accounting techniques, techniques and methods are the same for both types of accounting activities. And accounting acts in relation to tax accounting as a source of data necessary for the correct calculation of tax. Meanwhile, the direct accounting of the tax base, the procedure for calculating the amount of tax payable and the registration of payment of this amount belong to the scope of tax accounting.

(More details about taxable indicators - their properties, accounting and classification - will be discussed in clause 2.2 of this manual.)

Accounting for the tax base involves the use of two main accounting methods. First, it is possible to take into account the funds at the time of receipt and payment, when all amounts actually received by the taxpayer in a particular period are declared income, and the amounts actually paid, respectively, for the same period are declared expenses. This method is called cash. Otherwise, it is called the appropriation method, since its essence boils down to accounting only for those sums of money or other values ​​that are appropriated by the taxpayer in a certain legal form: received at the cash desk in cash, transferred to ownership through the execution of certain documents, etc. It can also be said that the content of this method is reduced to the requirement not to recognize the increase in the value of property as income until such an increase is objectified in one way or another.

Along with the cash method, the accumulative method, also called the net income method, is practiced. For this method characteristic is the requirement to take into account the moment when property rights and obligations arise, regardless of the actual receipt of funds. Therefore, under the accumulative method, all amounts the taxpayer has the right to receive in the tax period under consideration, regardless of whether these incomes are actually received, or whether their actual receipt in accordance with the terms of the transaction is still expected in the future, are recognized as income. In order to determine the costs incurred, the amount of property obligations that arose in the reporting period is found, regardless of actual payments. These methods will be discussed in more detail in Chap. 6 of this manual.

For different taxes, different accounting methods established by law may be applied. In particular, when calculating the tax base for property tax individuals it is unacceptable to use the accumulative method, but only the cash method.

Task N 3. Find the correct wording:

a) A tax is considered established only when all elements of taxation are defined: the object of taxation, the tax base, the tax period, the tax rate, the procedure for calculating the tax, the procedure and terms for paying the tax.

b) A tax is considered established only if all elements of taxation are determined: the object of taxation, the tax base, the tax period, the tax rate, the procedure for calculating the tax, the procedure and terms for paying the tax, as well as, if necessary, tax benefits and grounds for their use by the taxpayer.

c) A tax is considered established only if the taxpayers and elements of taxation are determined: the object of taxation, the tax base, the tax period, the tax rate, the procedure for calculating the tax, the procedure and terms for paying the tax.

d) A tax is considered established only if the taxpayers and elements of taxation are determined: the object of taxation, the tax base, the tax period, the tax rate, the procedure for calculating the tax, the procedure and terms for paying the tax, and, if necessary, tax benefits and grounds for their use by the taxpayer.



Loading...
Top