Windows 7 adds functionality to your login screen to give you additional logon options. If you want to lose the clutter, here is how to disable some or all of your credential providers.
Whether it was installed from the factory or add-on software you installed, these registry settings will disable the unwanted credential providers at your login screen.
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers
It will not be obvious what some of the providers are but you should be able to determine which one goes to which provider by looking at the value of the (Default) DWORD inside each key.
The screenshot below references the fingerprint scanner on my system but yours may be different.
To disable each of the items, create a DWORD value named “Disable” with a value of 1. For each key you disable it will be removed from your login screen.
Be careful which items you disable or you may not be able to log in with your password either. Only disable the items you know you won’t need and disable them one at a time. This should stop you from disabling too many items and not allowing you to login to your computer.
If you accidentally disable too many items, restart your machine in safe mode and set the disable key to 0 for the providers you need.
Once you have found all the correct keys your new login screen should show only the items you want.
If you’re bent on customizing every aspect of your Android phone, this helpful guide will show you how to swap out the stock boot animation for a new custom one.
Ubuntu has a lot of GUI-based methods for installing applications, but they take some time to search and find. Since the keyboard is usually faster than the mouse, managing your software via the command-line can be a real time-saver.
There was recently a lot of noise in the tech news world about the iPhone and iPad keeping a tracking log of your location, and while that’s now in the past, you might want to consider encrypting your backups anyway. Here’s how to do it.
There is no doubt that multiple tab browsing is a wonderful thing, but what if you want to conserve some vertical screen real-estate? Now you can hide and show the Tab Bar in Firefox as needed with a customized keyboard short...
Data loss is serious—and tragic—business. This week we want to hear about your data backup strategies and how you ensure that your data stays safe, secure, and ready to be resurrected should the Binary Reaper strike.
Once upon at time before the age of HTML, the internet looked like a command prompt and a world of text. Telehack is a simulation site that recreates the early internet experience.
Did you know that PowerPoint 2010 has a feature called Broadcast Slide Show with which you can share your presentation through the web to another computer, smartphone or any other device with a browser? Here’s how to use it.
HDMI cables, especially at brick and mortar stores, are painfully over priced. Generic cables work just as well and cost a fraction of the price.
Every Apple fanboy will tell you that Macs are safe from malware, but it’s just not true. Recently a fake AV program has been targeting and infecting OS X computers in the wild. Here’s a quick look at how it works, how to remove it, and also how to prevent it in the first place.
Cookies can be useful when you’re in control of them. Today we’re taking a look at how you can control cookies by blocking them except for when you want them to enhance your user experience.