Skip to main content

Have you ever wished that if you could hide your personal user account from the Windows Welcome screen?




One of the unfortunate side effects of the Welcome Screen is the listing of all of the user accounts on the computer. What if there is an account that you do not want the whole world to see? Using the same features that Microsoft uses to hide system accounts from the Welcome Screen. You can hide user accounts as well.
Hiding user accounts can be done by a simple hack in the registry. Hidden away in the local system settings is a list of accounts that Microsoft does not want to appear on the Welcome screen. These accounts are primarily system accounts under which different processes that run in the background use to execute.
To hide a user from the Welcome screen, all you have to do is create an entry on the list for the user you want to hide.



Removing a user account from Welcome Screen

Before You make any changes to registry , please create a restore point in your
computer, so incase if anything goes out of hand you can always restore
your computer to the earlier state and another the thing is to print a screens
shot of the registry when you reach the editing part. Be careful while editing,
make sure you are editing the correct one and as in the steps given below.

  1. Click the start button and select Run, then type regedit in the box and click OK.


  2. This will start up the system Registry Editor. You are going to want to expand the following keys:
    HKEY_LOCAL_MACHINE> SOFTWARE > Microsoft >Windows NT> CurrentVersion> Winlogon> SpecialAccounts> and UserList.


  3. You should now see the list of the account names, and parts of account names, that the system will look for and will hide. To add a name to the list, just right click and select New > DWORD value, as shown in the figure.



    After this you must be careful...!
  1. A DWORD is a specific data type of an entry in the system registry. In short, the DWORD data type allows an integer value to be stored.


  2. When the new key is created, enter in the name of the user’s account as the name of the key. Once you have done this, you can close regedit.


  3. After log off and back on or reboot, the user will not be displayed on the Welcome screen. If you ever want to log into the account that you hid from the Welcome screen, just press Ctrl+Alt+Delete on your keyboard once, twice, and you will be able to type in the name of the user under which you want to log in. This way, you can hide an account from your family or friends but still log into it.


  4. If you ever change your mind and want the account to be displayed on the welcome screen again, just delete the entry that you made in the list in the System Registry and everything will be back the way it was.

Comments

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Fortifying Cybersecurity: A NIST CSF Perspective on Zero Trust and Passkeys

Cybersecurity is like protecting a fortress from invaders. Traditionally, we built strong walls around our castle, trusting those inside and keeping potential threats outside. But in today's digital world, threats can come from within and outside, making traditional defences inadequate. This is where the concept of zero trust comes in. What is Zero Trust? Imagine your home. You don't blindly trust everyone who walks in, right? You might ask for identification or make sure they have a reason to be there. Zero trust is similar. It means not automatically trusting anyone or anything trying to access your digital "home" (like your network or data). Instead, it's about constantly verifying and monitoring every access attempt, regardless of where it comes from. Why Zero Trust Matters: Zero trust addresses three key goals in cybersecurity, often called the CIA triad: Confidentiality : Just like you wouldn't want strangers snooping through your person...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...