![]() ![]() 4 Things IT Pros Can't Wait to Declare Independence From Water Cooler.Anyone know of similar, worthwhile conference(s) in the US? I know there are a ton for cybersecurity and more specific topic based ones out there but I'm looking for something like Spiceworld. I made it to Spiceworld last year but can't attend this year. IRL Conference recommendations Industry-Specific IT.Snap! - Confidential Computing, Light Bender, Fireworks or Drones, LionGlass Spiceworks Originalsįlashback: July 4, 1956: MIT’s Whirlwind becomes the first computer in the world to allow its users to enter commands through a keyboard (Read more HERE.).I have already cleared the cache and the credential manager on Windows and this has not solved the problem. How does this happen? Because at this moment, User2 can click on this and is granted access to User1's emails. I go to Edge and make my way to the login portal to find out that User1's 365 account is "connected to Windows" Signed user1 out of user2's excel and deactived install from User1 so user1 is no longer associated with this computer. ![]() This was allowing user2 to see user1's private documents. ![]() User1 and User2's accounts were both signed into Excel. We used one of User1's installs to install Office programs on this computer. User2 did not have a Office365 license when this computer was set up. User1 is a high permissions user and gets sensitive information and is User2's manager. There are 2 users associated with this computer. I currently have a 3040 Micro on Windows 10. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |