Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Time restricted lockdown

Posted on 2004-03-23
3
Medium Priority
?
243 Views
Last Modified: 2013-12-04
I need to Lockdown my sons computer from like Midnight to 6 A.M. Is their a way to do this with out cutting the power?
0
Comment
Question by:irond1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Expert Comment

by:guidway
ID: 10664540
what O.S are you running? Win2k,WinXP?

If either of those you can press ctrl-alt-del and click "Lock Computer" and it will require a sign on password to get back on it.

guid
0
 
LVL 12

Accepted Solution

by:
guidway earned 200 total points
ID: 10664550
oh wait... you want it timed... sorry.

this might work:
http://www.toplang.com/desktoplock.htm
0
 

Expert Comment

by:mspolter
ID: 11504768
Check out the following software:

http://www.spectorsoft.com/products/SpectorPro_Windows/entry.asp?refer=6915

This will enable you to monitor what he is doing and severely restrict internet activities and applications based on time.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question