How can you put advanced account security on windows 2000?

1 Answer

Answer :

answer:They Public Access Computing Security Tool may work for you. It’s the ancestor of Windows SteadyState, which works with XP and later http://www.webjunction.org/pc-protection/articles/content/432194 Public Access Computing Security Tool Providing public access computers often involves time spent keeping the computers functioning properly. Without a security system in place, users may make both intentional and unintentional changes to the computers. These changes can include changing the desktop background, saving files, installing new software, or deleting necessary operating system files. The Public Access Computing Security Tool is a free application designed by the Bill & Melinda Gates Foundation to secure your public access computers. The Security Tool is an adaptation of the security system currently in use on tens of thousands of computers granted to public libraries across the country. This tool is now available for you to use on any non-Gates Windows 2000 or XP Professional computer. Using the Security Tool, you can create secure public profiles on your computers that restrict users from making changes to the computer while allowing access to the resources they need. What the user sees Once the Security Tool is installed, when you log on as a public user you see a standard Windows desktop with icons for the chosen programs. Open My Computer and the hard drive is hidden and unavailable. Click on the Start Menu and you are missing Run, Settings (access to Control Panel and Printers), Search and most programs. Open My Network Places and you are unable to browse to other computers on the network. Once you log off, temporary Internet files, saved and downloaded files, and additions to the History and Favorites folders, are all deleted. You control it Using your administrative account, you can log on to the computer with no restrictions. You can perform your normal tasks such as updating your antivirus program or installing new software. As an administrator, you can use the Public Profile Manager program to remove the security restrictions and make any changes to the public profiles. You can also use the Manager to create a backup of your profile settings to transfer to your other computers, making it quick and easy to set up identical public access computers.

Related questions

Description : Agni 4-- the most potent and technologically advanced among India’s strategic arsenal, has a range of (a) 1000 KM (b) 2000 KM (c) 3000 KM (d) 5000 KM

Last Answer : (c) 3000 KM

Description : How do activate VIPRE Advanced Security with retail card?

Last Answer : VIPRE est l'un des principaux fournisseurs de solutions de sécurité internet protégeant les entreprises, les fournisseurs de solutions et les utilisateurs à domicile contre les cybermenaces coûteuses et ... et des e-mails et une analyse en temps réel des logiciels malveillants.ly/QbXnfEB

Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network

Last Answer : c. Security Administrator Tool for Analysis Networks

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : How should security be handled with juvenile death threats in the school community?

Last Answer : If they’re not concerned, why should you be?

Description : Can you rent an apartment if you don't have a job but have lots of money saved up in an account or are going to school?

Last Answer : You can often pay in advance for a specific length of time, but your rental will not extend past that unless you pay in advance.

Description : What can I do about my college opening up a bank account in my name to transfer the surplus of my financial aid money to me?

Last Answer : Talk to your financial aid office as soon as possible. Ask them what the new policy is, and if it’s your only option.

Description : Letters of recommendation - better to have a "name" or a personal account?

Last Answer : IMHO, The Peace Corps doesn’t care what “serious names” you know. I think they want to know about the real you and what you’re capable of.

Description : What happens if you didn't put the medication you were taking on your school form?

Last Answer : Just say that you forgot that medication on the original form, and you want to make sure the forms are correct now.

Description : Have you ever put yourself through a long-term, difficult process in order to reach an uncertain end?

Last Answer : University with a double major in Philosophy and Psychology while running out of money and sanity. The rest will be in my book…

Description : What information should be put on stickers that identify a kids' items?

Last Answer : How about name, grade and school name?

Description : I have to write a persuasive essay, one with research and facts. This is my first semester of college. Any ideas for a topic that won't put me to sleep?

Last Answer : So—what are your interests?

Description : Should I get a minor is CS, or put my efforts towards certifications?

Last Answer : It depends on what certifications you're planning on getting, and what kind of a job you want to get in the long run. For software jobs, certifications are worthless; you'll be asked to ... hardware and networking jobs, certifications are much more important, but the meaningful ones are hard to get.

Description : Is it wrong for me to put articles in a Resources page that I read but didn't cite in my paper?

Last Answer : I believe it is a good idea to include them. Sometimes when we read books we subconsciously remember a phrase or a thought that we use in our writings later. If you want to be super clear (and if your ... , ask your teacher, they're the ones marking it so whatever they want is what you should do :)

Description : What type of scanner is available that will scan negatives (both color & B&W) and which will work with an older operating system like Windows 2000?

Last Answer : answer:Very few. You might find a used one, but even that is a long shot. Anything that is new is built for Vista and higher, and nothing will have drivers for Windows 2000. W2000 was released in 1999, and that’s 13 years ago, which is ancient history.

Description : How Can I Get My windows 2000 To Run Better?

Last Answer : This is a bag of hurt. It will never run well. 2000 Pro runs like shit on a computer with 64megs of RAM. And that is with a faster CPU. I really hope you didn’t pay for this.

Description : Could I download Windows Media Player For Windows 2000?

Last Answer : Download an older version of Winamp, why are you running Windows 2000 though? Most of the newer software and drivers aren’t supported on that OS if im not mistaken.. Here’s a link to all the older versions of Winamp link

Description : How doI share a USB printer in Windows 2000 with a Mac 10.2 client.

Last Answer : Never mind, fixed it.

Description : How much do u think it will cost to tint the windows on a 2000 ford mustang gt?

Last Answer : your credability?

Description : Which of the following is not an operating system: a) DOS b) Google c) Windows 2000 d) None of These

Last Answer : b) Google

Description : ……………….. is a example of an operating system that support single user process and single thread. A) UNIX B) MS-DOS C) OS/2 D) Windows 2000

Last Answer : B) MS-DOS

Description : Possible thread states in Windows 2000 operating system include: (A) Ready, running and waiting (B) Ready, standby, running, waiting, transition and terminated. (C) Ready, running, waiting, transition and terminated (D) Standby, running, transition and terminated.

Last Answer : (B) Ready, standby, running, waiting, transition and terminated.

Description : In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called (A) NTFS file system (B) Hardware abstraction layer (C) Microkernel (D) Process Manager

Last Answer : (B) Hardware abstraction layer

Description : A part of Windows 2000 operating system that is not portable is (A) Device Management (B) Virtual Memory Management (C) Processor Management (D) User Interface

Last Answer : (B) Virtual Memory Management

Description : The character set used in Windows 2000 operating system is .... (A) 8 bit ASCII (B) Extended ASCII (C) 16 bit UNICODE (D) 12 bit UNICODE

Last Answer : (C) 16 bit UNICODE

Description : If and 2000 is placed in a bank account that pays 3 compound interest per year how much will be in the account in 2 years?

Last Answer : 2120.8

Description : If and 2000 is placed in a bank account that pays 3 compound interest per year how much will be in the account in 2 years?

Last Answer : 2120.8

Description : A minimum yearly deposit of ________ is required to open and maintain a PPF account, and a maximum deposit of _____. A. Rs. 500 and Rs 1.50 lakhs B. Rs. 1000 and Rs 2.50 lakhs C. Rs. 2000 and Rs 3.50 lakhs D. Rs. 5000 and Rs 4.50 lakhs

Last Answer : A. Rs. 500 and Rs 1.50 lakhs Explanation: A minimum yearly deposit of Rs. 500 is required to open and maintain a PPF account, and a maximum deposit of Rs.1.5 lakhs (as on Financial year 2015- ... Income Tax Act. The amount can be deposited in lump sum or in a maximum of 12 instalments per year.

Description : The initial deposit for opening of savings account shall be accepted in cash wef a) 01.01.1990 b) 05.02.2000 d) 12.02.2005 d) None of these

Last Answer : a) 01.01.1990

Description : Which of the following method that is used to taken into account the slenderness effect of columns according to IS:456 - 2000 [ A ] Reduction coefficient method [ B ] Slenderness method [ C ] Moment magnification method [ D ] None of the above

Last Answer : [ A ] Reduction coefficient method

Description : Was too much hype and expectation put on the year 2000 by those living decades ago?

Last Answer : Yes, and by a lot of other people.

Description : How do you put a GBA emulator on a PSP 2000?

Last Answer : Yea, you’re going to have to install a custom firmware to do that. Is your firmware hacked?

Description : Windows 10 Update and Security refuses to launch. What is the solution?

Last Answer : answer:1) First I would run Disk Cleanup. You may be short on drive space. Even if you have plenty of drive space it will not hurt Disk Clean in Start/ Search box and you should be able to ... and run the Windows Update Troubleshooter. These are just first steps. It might not work. Let us know.

Description : How to adjust the blocking setting in Windows Local/Group security policy?

Last Answer : How are you accessing the internet… Hotspot, your own internet service, work internet? are you ising wireless or wired connection? Are the blocked sites social media sites?

Description : Do any of you know how to get rid of the 'Windows 2010 Security' virus?

Last Answer : Look here towards the bottom are manual instructions. You will have to go into safe mode to do this.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : I would like to ask if there is already a security update for windows that prevents the blackmail virus from installing on our machine?

Last Answer : Microsoft responded quickly to this issue and released the necessary updates. What's unprecedented is that updates have been made even for versions of Windows that have long been unsupported. For ... poses a threat only to those who have turned off automatic updates on their machines.          

Description : What is better than "security question and answer" for email account verification?

Last Answer : Here is a genius tip I read once for these recovery questions: Make the answer completely unrelated to reality, or even the topic of the question.

Description : What are some of the most useless security questions you've been prompted to give the answers to when accessing an online account?

Last Answer : answer:Some of the security questions asked by my AT&T account involved some really obscure crap to which I never gave any thought. E.g., what style are your favorite shoes, or what color are your father’s favorite socks?

Description : Social Security dilemma with a bank account?

Last Answer : answer:If your dad was left the things by your grandfather (by will or simply being next of kin) then they are his to take out. Though you may have to fill out some paperwork to get them. Everything ... trying to trick you out of money, and frankly I would take it out and not put it back there.

Description : Can I draw Social Security benefits on my husband's account after a divorce with marriage of 28 years?

Last Answer : Yes, under certain requirements.If you are divorced, but your marriage lasted 10 years or longer, you can receive benefits on your ex-spouse's record (even if they have remarried) if: ... or disability benefits.See link for more information.https://www.ssa.gov/planners/retire/divspouse.html

Description : The yearly unsold certificate statement received from all SO by HO will be forwarded to a) Circle stamp depot b) Head of the circle d) Postal Account office d) Security press nasik

Last Answer : d) Security press nasik

Description : Pledging of TD account as security in the name of a) The president of India or Governor of the state in his official capacity b) The reserve bank of India or a scheduled bank or a co-operative society c) Both the A and B d) None of these

Last Answer : c) Both the A and B

Description : Security deposit account should be maintained in form a) ACG 43 b) ACG 38 c) ACG 54 d) ACG 48

Last Answer : a) ACG 43

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These