Protect your computer with just this simple trick

Do you believe that protecting your computer with this simple procedure is enough without applying too many tricks, software or other solutions. This simple trick does not include programs, anti-virus software or command line, … as you have done before.

All you need to do is create a limited user account, and use that limited account for all daily activities on your computer, including online activities. Internet and activities at offices, workplaces.

Protect your computer with just a few simple tips

Ensure that all other users using your computer also have limited accounts. Save your Admin account for administrative tasks. Using this system will prevent or limit the spread of malware (malware) on both Windows and Mac computers.

Only thing you will be “removed” the ability to install, edit or remove software immediately. On today’s operating systems, all you need to do is enter the Admin username and password. Although security is a bit more secure, but a bit inconvenient.

How does a restricted account protect your computer?

This account operates separately from the system. Unlike other Admin accounts, restricted accounts cannot install, update or remove other executable applications and software.

So malware (viruses), viruses, worms, trojans, rootkits and ransomware that try to infect and spread on your computer through a limited account cannot install themselves and you will not have to face it. with any trouble, any trouble. If unfortunate malware attacks and distributes within a restricted account, it will only affect the files, folders and applications of that particular user account. Often, malware can’t access other operating systems or user accounts.

According to the latest report from UK security firm Avecto, released in February 2017: “In 2016, 93% of Windows 10 vulnerabilities were mitigated by removing Admin rights … including 100 parts. The hundreds of vulnerabilities affecting the latest browser are Edge. ”

While there are no similar figures to cite on Macs, Intego Security recommends that users create restricted computer accounts or standard accounts for similar reasons.

How to create a restricted account

By default, Microsoft and Apple set each user to have an Admin account. In fact you only need one Admin account on one computer and each user must have a limited account for daily use.

To do this you will need to use an Admin account. Follow the steps below to create a limited computer account on each version of Windows.

– On Windows 7:

Access Start =>Control Panel =>Add or Remove User Accounts or User Accounts =>Create a New Account. Enter the username you want to use, select the button Standard User then click Create Account. Then click Create Password and enter the password you want to use.

– On Windows 8 or 8.1:

Press the key combination Windows + I to open the Settings menu. Here you choose Control Panel, then select Add or Remove User Accounts or User Accounts, depending on the options on the Control Panel. Choose Create a New Account. Enter the username you want to use, select the button Standard User then click Create Account. Next click Create Password and enter the password you want to use.

– On Windows 10:

Access Start =>Settings =>Accounts =>Family & Other Users. Click here Add someone else to this PC, then select I don’t have this person’s sign-in information then click next. Ignore the notification, enter the email address or phone number of the user.

On the next window, select Add a user without a MIcrosoft account then click Next.

Note: On Windows 10 versions Home and Professional may not show the above 2 steps.

Next, enter the desired username and click next.

Very few users know about this solution

The question is why do so few users know about this solution? Maybe it’s because the user didn’t know about the restricted account, and if so, they thought it was just a way to control their child’s activities or take control of the Guest account.

Another reason is that on Windows XP, using limited accounts is “terrible”. Most applications assume that the user has full Admin rights and many applications do not work properly in restricted accounts. If the restricted user encounters a request process authorized by the Admin, they will have to transfer the Admin administration rights to continue.

However, this has changed since Windows Vista, with the introduction of Microsoft’s User Account Control that made the process “smoother”. Software developers are required to provide maximum functionality for restricted accounts and if Admin authorization is required, a dialog box will appear asking the user to limit username and password. Admin account password.

Many users use this system on Windows computers for many years and have not encountered any problems or problems at all. When the user updates the software, a popup dialog box appears, where the user enters Admin account information. On both Windows 7 and Windows 10, Windows Update will run without any hassle.

Some drawbacks of limited accounts

This account does not prevent or mitigate all malware infections. Some malware can “escalate privileges” and give themselves system privileges that a limited user does not have. However, with malware often running on the computer, which users often face, it is not possible to do that.

Also using a limited account does not prevent phishing attacks (social engineering), that is, deceives you to steal sensitive information. If the phishing email requires you to login Facebook or fake Gmail, limited user accounts can’t do anything.

If the fake software requires your Admin username and password so that it can install itself, providing credentials will “lose” the benefits that the limited account brings.

The truth is that only you can prevent phishing attacks. But limited user accounts can prevent almost anything else.
Hopefully, after the article, readers will know more ways to protect your computer with this simple trick. How to create a limited account is not too difficult, just take a few minutes to perform, you can be assured your computer is protected safely. If you have any comments or questions, you can leave your comments in the comments section below!


Add a Comment

Your email address will not be published. Required fields are marked *