programming4us
programming4us
DESKTOP

Windows 8 : Determining who’s who through authentication (part 5) - Logging on by using a picture password,Using a personal identification number for authentication

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Logging on by using a picture password

Windows 8 supports the use of picture passwords for authentication. To create a picture password, you select a picture and associate some gestures with it that are then used to sign in to Windows.

The gestures can include the following:

  • Circles

  • Lines

  • Taps on the screen

These short drawings on the picture you have chosen are used to create your password. After a gesture is configured, this picture password replaces the traditional password you assigned to your user account.

Note

ACCESSING PHOTOS FROM ONLINE SERVICES

You can select a picture to use with your picture password from anywhere on your computer. If you choose the Photos application, you can also connect to online services such as SkyDrive to retrieve photos. When using photos from an online service, you might need to authenticate with your user name and password for the selected service to access the items.

Creating a picture password

To configure a picture password, complete the following steps:

  1. Access the Settings charm, select PC Settings, and then select Users from the navigation pane.

  2. Tap or click Create a Picture Password.

  3. Enter the current password for your user account and tap or click OK.

    Figure 6 shows the picture password welcome screen.

    Creating a picture password for sign-in

    Figure 6. Creating a picture password for sign-in

  4. Tap or click Choose Picture.

  5. Select the photo to use for your picture password from anywhere on your computer or from online photo albums and tap or click OK.

  6. After previewing the photo and dragging it to the position you want for the password, tap or click Use This Picture. If you do not want to use the selected picture, tap or click Choose New Picture.

  7. Draw three gestures on the selected picture to enable it as a password.

    Important

    SEQUENCE AND DIRECTION COUNT!

    Windows remembers what you draw first, second, and third and how you draw a line or a circle. You will need to use the same sequence and directionality for your gestures every time. This increases the security of a password significantly.

  8. Redraw the same three gestures to confirm them.

  9. Tap or click Finish to complete the creation of a picture password.

The next time you sign in to Windows, you must use the picture password you created.

Removing a picture password

If you have a picture password and decide you no longer want to use this type of password, you can remove it by performing the following steps:

  1. Access the Settings charm, select PC Settings, and then select Users from the navigation pane.

  2. Tap or click the Remove button next to Change Picture Password.

Important

CHANGING YOUR PICTURE PASSWORD

At any time, you can change your picture password. To change the picture and gestures, select Change Picture Password instead of Remove, and repeat the steps to select a picture and add gestures.

Using the picture password

Figure 7 shows what the sign-in screen looks like when using a picture password.

Signing in with a picture password and gestures

Figure 7. Signing in with a picture password and gestures

When signing in with a picture password, the picture and gestures are associated with your existing user account. If necessary, you can select Switch To Password from the sign-in screen to allow a password to be entered. After you have selected Switch To Password, the picture password will be moved under sign-in options on the sign-in screen. Selecting the picture password option will change your sign-in back to the previously configured picture password.

Although picture passwords were designed with touch screen devices in mind, they work on standard laptop or desktop installations of Windows 8.

Using a personal identification number (PIN) for authentication

Another way to shorten the sign-in process is by using a PIN. This assigns a 4-digit code to your user credentials, enabling you to sign in with just this assigned code. To create a PIN, complete the following steps:

  1. Access the Settings charm, select PC Settings, and then select Users from the navigation pane.

  2. Tap or click Create A PIN.

  3. Enter your current password.

  4. Enter a 4-digit number.

  5. Re-enter the 4-digit PIN for confirmation.

  6. Tap or click Finish.

When the PIN is created, you are returned to the PC Settings screen. If you want to change your PIN, click the Change PIN button or click the Remove button to remove the PIN from your account.

The next time you sign in to Windows with the user account that has a PIN assigned, it prompts you to enter a PIN rather than a password. If you would rather enter your password, click Sign-In Options on the sign-in screen to select a different method.

The sign-in options are available when alternate methods of authentication are configured for a user account. Figure 8 shows these options.

PIN authentication and additional sign-in options

Figure 8. PIN authentication and additional sign-in options

Additional sign-in options can be useful in several situations, such as when a user signs in to a mobile device or when a user needs a simplified sign-in procedure.

Other  
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 9) - Configuring WMI filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 8) - Managing GPO links, Configuring security filtering
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 7) - Viewing infrastructure status, Creating GPOs
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 6) - Advanced Audit Policy Configuration
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 5) - User Rights Assignment, Security Options
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 4) - Refreshing Group Policy
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 3) - Configuring a central store, Using Starter GPOs
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 2) - Group Policy and Active Directory design
  •  Windows Server 2012 : Planning, implementing, and managing Group Policy (part 1) - Understanding policies vs. preferences
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 5) - Monitoring system resources by using Performance Monitor
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us