G
Guest
I read a couple of similar posts about this but I did not see a suitable
answer yet. I am extremely irritated that I am now forced to login to my own
system (I live alone and share the computer with no one and now I have to
login at work AND at home -this is just ridiculous!) I have to do this
because someone at Symantec decided to link any automated antivirus checks
with Windows XP Task Scheduler, so if you haven't configured a password,
things don't run anymore. I am lodging a separate complaint with Symantec,
but what I hope to find out is how to bypass the manual login process
whenever I start up my system. I have one userid configured with
Administrator privileges - I do not want to have to be at the system and
manually enter the password before the system will do the complete boot
process. Surely there must be a way to bypass this step! Why does Task
Scheduler have to have passwords configured so other things will run??????
Please help! And please - somebody FIX this! At least give us, the user,
the OPTION of how we want our systems to be configured and protected!
answer yet. I am extremely irritated that I am now forced to login to my own
system (I live alone and share the computer with no one and now I have to
login at work AND at home -this is just ridiculous!) I have to do this
because someone at Symantec decided to link any automated antivirus checks
with Windows XP Task Scheduler, so if you haven't configured a password,
things don't run anymore. I am lodging a separate complaint with Symantec,
but what I hope to find out is how to bypass the manual login process
whenever I start up my system. I have one userid configured with
Administrator privileges - I do not want to have to be at the system and
manually enter the password before the system will do the complete boot
process. Surely there must be a way to bypass this step! Why does Task
Scheduler have to have passwords configured so other things will run??????
Please help! And please - somebody FIX this! At least give us, the user,
the OPTION of how we want our systems to be configured and protected!