Solved

Digital Finger Print Setup - Lenovo

Posted on 2007-11-18
7
7,232 Views
Last Modified: 2013-11-26
I recently purchased a Lenovo (IBM) T61 notebook  that came with a finger print reader. I do not wish to use this method of log in; however the setup window for finger print ID access keeps appearing every time I restart the computer. How can I get rid of this annoying window? The OS is Vista Ultimate.
0
Comment
Question by:Generator
  • 2
  • 2
7 Comments
 
LVL 70

Expert Comment

by:garycase
Comment Utility
There are two solutions for this:

(1)  Simply disable the fingerprint reader in the BIOS;

or

(2)  Temporaily disable User Account Control ... then let the setup continue and simply set it so you do not use that method of security ... and then re-enable User Account Control [Note you'll have to reboot each time you change the UAC setting].
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
Comment Utility
Just set it up and the annoying window will go away.

You don't have to use it once it's set up but you DO have the choice of using it.  If you really don't want to, then after you've set it up, disable the service.

Jeff
TechSoEasy
0
 

Author Comment

by:Generator
Comment Utility
I checked the BIOS and did not find anything related to the fingerprint device. Where would I locate the "User Account Control" in Vista?
So, once I set this up it then runs as a "Service"?
Thanks
0
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
Comment Utility
Control Panel - User Accounts - "Turn User Account Control On/Off"

Just turn it off; reboot; run the setup wizard; reboot; turn UAC back on; and reboot one last time.

With UAC turned on the wizard isn't able to correctly store the "I don't wanna use it" flag :-)
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
Comment Utility
The thing is that once you set it up you don't HAVE to use it, but it's a nice feature to have just in case.  

Jeff
TechSoEasy
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
The Samsung SSD 840 EVO and 840 EVO mSATA have a well-known problem with a drop in read performance. I first learned about this in an interesting thread here at Experts Exchange: http://www.experts-exchange.com/Hardware/Storage/Hard_Drives/Q_2852…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now