Coordinate machine sharing time with 'User Time Control Center'

For computers that contain particularly important data types, coordinating reasonable time for shared users is a very effective management measure.

User Time Control Center will help you make this easy.

User Time Control Center (UTCC) will coordinate the computer usage time at the most effective level so that you can easily determine the responsibility of each user in your shift. Once everything is correctly set in UTCC, only the User who comes to the session can use the computer. In addition, UTCC is an effective computer security tool when it is equipped with some application lock functions as well as encryption.

Using UTCC is quite simple and follows the following order:

Click on ' Extra Usage Time ' to display the ' Extra Usage Time ' interface -> click the down arrow to select the User name in the ' Quick Select User ' box -> click the ' Add ' button to set the time for The selected user in the interface has just appeared.

Set the number of days that the selected User is allowed to use the computer in the ' Since date ' and ' To date ' boxes. During that time, the selected User will be allowed to use the computer for the time of day using the sliders at ' Since Time ' and ' To Time '.

Picture 1 of Coordinate machine sharing time with 'User Time Control Center' For example, drag the slider at ' Since Time ' to 7:00 and drag the slider at ' To Time ' to a data of 12, which means: The selected user is only allowed to use the computer from 7am until 12pm. Continue to do so for the remaining users who are allowed to use the computer at different times of the day corresponding to their shifts. When done, click ' OK ' so that the selected time is displayed in the ' Extra Usage Time List ' list .

With the above stage, it seems that you have specified the time of day use for each person sharing the computer.

To be more careful, you should go to ' Weekly Restrictions ' to set the time period for 'forbidden work' for each User by marking red at the time intervals to prevent it. For example, you choose the second day (Mo), red mark from 0g to 6g and from 13g to 23g means that on the second day of the week, the selected user is only allowed to use the computer from 6pm to 13g.

For added security, you can go to ' Security Restrictions ' to limit User to the following features:

- Forbit User to change the system time : does not allow User to change the usage time set by you.

- Disable the Task Manager : do not allow User to enter Task Manager.

- Disable the ability to manage user accounts : do not allow the User who is using the device to change other user accounts.

- Disable the 'Add / Remove Programs' . : does not allow User to access the ' Add / Remove Programs ' of Control Panel.

- Hide 'Setup.exe' and 'Install.exe' files . : does not allow User to install new applications to the computer.

If the computer has secret folders that you do not allow the user to enter, you can click on ' Protect Files ' to display the ' Protect Files ' -> interface and then click the ' Add ' button to find it. The folder needs to hide the -> after selecting and clicking ' OK ' is your secret folder will become 'invisible' for all Users.

For UTCC security, you should go to ' General Options ' -> click on the ' Change password ' button to set a password for the application and only you can use it.

At the family level, UTCC is also considered a very effective tool to manage children's computer usage.

The 1st Security Software Center company is selling User Time Control Center 3.4 for $ 20. Interested readers can visit here to download the trial version with Zip file with a capacity of about 1.76 MB.

HOANG HAI