SECURITY

Implementing Security in Windows 7 : Lock Your Computer

8/29/2012 1:52:49 AM
Protecting your account with a password prevents someone from logging on to your account, but what happens when you leave your desk? If you remain logged on to the system, any person who sits down at your computer can use it to view and change files. To prevent this, lock your computer, which hides your desktop and displays the Windows 7 Welcome screen.

Once your computer is locked, anyone who tries to use your computer will first have to enter your password in the Welcome screen.

Lock Your Computer

LOCK YOUR COMPUTER

1 Click Start.

2 Click the power button arrow ().

3 Click Lock.

Windows 7 locks your computer.

• The word "Locked" appears under your user name.



UNLOCK YOUR COMPUTER

1 Click inside the password text box.

2 Type your password.

3 Click Go ().

Windows 7 unlocks your computer and restores your desktop.



Simplify It

I use the Lock command frequently. Is there a way to make it easier to access?

Yes, there are two faster methods you can use. The first method is to press . The second method is to customize the Start menu's Power button to lock your computer instead of shutting it down:

1 Right-click Start and then click Properties.

2 In the Taskbar and Start Menu Properties dialog box, click the Power button action and then click Lock.

3 Click OK (not shown).


Other  
  •  Security in Windows 7 : Security Features Previously Introduced in Windows Vista
  •  Security in Windows 7 : Addressing Specific Security Concerns
  •  Linksys EA4500 Router Review
  •  Administering COM+ Security (part 2) - Assessing and Assigning Role Scope, Managing COM+ Security
  •  Administering COM+ Security (part 1) - Viewing the COM+ Catalogue, Populating COM+ Application Roles
  •  Implementing Security in Windows 7 : Protect an Account with a Password
  •  Implementing Security in Windows 7 : Check Action Center for Security Problems
  •  Implementing Security in Windows 7 : Understanding Windows 7 Security
  •  Programming COM+ Security (part 3) - Compiling and Installing the COM+ Application
  •  Programming COM+ Security (part 2) - Creating the Serviced Component, Specifying the COM+ Application Type
  •  
    Top 10
    Review : Sigma 24mm f/1.4 DG HSM Art
    Review : Canon EF11-24mm f/4L USM
    Review : Creative Sound Blaster Roar 2
    Review : Philips Fidelio M2L
    Review : Alienware 17 - Dell's Alienware laptops
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8