Solved

Digital Finger Print Setup - Lenovo

Posted on 2007-11-18
7
7,234 Views
Last Modified: 2013-11-26
I recently purchased a Lenovo (IBM) T61 notebook  that came with a finger print reader. I do not wish to use this method of log in; however the setup window for finger print ID access keeps appearing every time I restart the computer. How can I get rid of this annoying window? The OS is Vista Ultimate.
0
Comment
Question by:Generator
  • 2
  • 2
7 Comments
 
LVL 70

Expert Comment

by:garycase
ID: 20317612
There are two solutions for this:

(1)  Simply disable the fingerprint reader in the BIOS;

or

(2)  Temporaily disable User Account Control ... then let the setup continue and simply set it so you do not use that method of security ... and then re-enable User Account Control [Note you'll have to reboot each time you change the UAC setting].
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 20318556
Just set it up and the annoying window will go away.

You don't have to use it once it's set up but you DO have the choice of using it.  If you really don't want to, then after you've set it up, disable the service.

Jeff
TechSoEasy
0
 

Author Comment

by:Generator
ID: 20319246
I checked the BIOS and did not find anything related to the fingerprint device. Where would I locate the "User Account Control" in Vista?
So, once I set this up it then runs as a "Service"?
Thanks
0
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
ID: 20319350
Control Panel - User Accounts - "Turn User Account Control On/Off"

Just turn it off; reboot; run the setup wizard; reboot; turn UAC back on; and reboot one last time.

With UAC turned on the wizard isn't able to correctly store the "I don't wanna use it" flag :-)
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 20320452
The thing is that once you set it up you don't HAVE to use it, but it's a nice feature to have just in case.  

Jeff
TechSoEasy
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
For some time some of our users experienced package loss on a couple of our Lenovo Thinkpad S531 machines running Windows 8 or Windows 8.1 64-bit OS. I was not able to find many answers online, but did after some investigation I began to suspect Blu…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now