{"id":15185,"date":"2016-09-20T10:38:10","date_gmt":"2016-09-20T10:38:10","guid":{"rendered":"http:\/\/blogs.nist.ac.th\/nistict\/?p=15185"},"modified":"2018-02-02T07:26:43","modified_gmt":"2018-02-02T07:26:43","slug":"screen-saver-lock-and-hot-corner-activation-safety-first","status":"publish","type":"ht_kb","link":"https:\/\/blogs.nist.ac.th\/technology\/knowledge-base\/screen-saver-lock-and-hot-corner-activation-safety-first\/","title":{"rendered":"Screen Saver Lock and Hot Corner Activation- Safety First!"},"content":{"rendered":"<p>Here is a quick 2 minute video showing how to require a password to unlock your screensaver. I also show you how to quickly activate your screensaver at any time by turning on a &#8220;HotCorner&#8221;.<\/p>\n<p>Quick soap box speech&#8230;<\/p>\n<p>You should never leave your computer unless is has been locked with a password. Just like regularly backing up your computer&#8230; it&#8217;s a small hassle, but it will save you a tremendous amount of stress and time if you get into the habit. Every school I&#8217;ve worked at has had an issue at one point or another with someone gaining access to a computer that they shouldn&#8217;t have. A password lock on your computer is one way you can better protect your computer and therefore yourself.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<br \/>\n<iframe loading=\"lazy\" width=\"535\" height=\"290\" src=\"https:\/\/www.youtube.com\/embed\/yo_fXLf3fnc?rel=0\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is a quick 2 minute video showing how to require a password to unlock your screensaver. I also show you how to quickly activate your screensaver at any time by turning on a &#8220;HotCorner&#8221;. Quick soap box speech&#8230; You should never leave your computer unless is has been locked&#8230;<\/p>\n","protected":false},"author":1,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[1154431],"ht-kb-tag":[1123158,1123155,586333,1072,844149],"class_list":["post-15185","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-it-support2","ht_kb_tag-hot-corner","ht_kb_tag-lock","ht_kb_tag-password","ht_kb_tag-safety","ht_kb_tag-screen-saver"],"_links":{"self":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/15185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/comments?post=15185"}],"version-history":[{"count":1,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/15185\/revisions"}],"predecessor-version":[{"id":15307,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/15185\/revisions\/15307"}],"wp:attachment":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/media?parent=15185"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-category?post=15185"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-tag?post=15185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}