Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Tutorial Windows: Run Apps as Admin Without Password Prompt from Standard Windows Accounts

Posted on October 16, 2015

Basic security measures in Windows are heavily related to the administrator account, without which you wouldn’t have much freedom to install or run specific programs, services, or video games.

Even if you’re logged into an administrator account, prompts still show up when running certain executables, but you’re not asked to write down the password again. The situation changes when running the same applications from a regular account, with the prompt showing up, requiring the administrator password.

This method is used to prevent others from messing up system configurations, or worse, allowing malicious content to infiltrate, even by accident. On the other hand, this prompt becomes frustrating when you frequently have to run a specific program with a regular account, even if it’s made to enhance security.

Luckily, there are methods of providing the right clearance for a target program, without disabling anything, but rather simply granting full administrator privileges to just that specific program. Some tweaking is required, but there’s also an app for that.

The Windows method

Important note: First of all, an elevated administrator account must be enabled for this method to work. Doing so is easy, but it’s highly recommended NOT to use it for everyday activities, since it’s fitted with unrestricted access to any area of your computer, every operation you perform, and isn’t even prompted by the UAC, which makes it an easy target for malicious content.

Step 1: Make sure you’re currently logged into an administrator account. Launch the Command Prompt with admin privileges. It’s easily done by right-clicking the Start Menu button and choosing the option from the menu.

Step 2: Regardless of the location, type in this command:

net user administrator /active:yes

Step 3: Close the Command Prompt and access the Control Panel.

Step 4: From the User Accounts section, follow the link to Change Account Type.

Step 5: Now, pick the new Administrator account, and choose to Create a Password.

Step 6: Fill in the corresponding fields for the password and hint fields, and press the Create Password button. You can close the Control Panel.

Step 7: Sign out of the current administrator account and log into the one you want to grant special permission to.

Step 8: Go to the location you wish to launch the program from, or stay on the desktop. Right-click an empty space, and choose to create a New Shortcut.

Step 9: A new prompt shows up. In the field where you need to Type The Location of The Item, write down this code:

runas /user:computer_nameAdministrator /savecred “C:application_pathexecutable_name.extension”

In this example, the code we had to write down looks like this:

runas /user:DESKTOP-N12V7FQAdministrator /savecred “C:Program Files (x86)IObitIObit UninstallerIObitUninstaller.exe”

Step 10: Press Next, and give the shortcut the name you see fit.

Step 11 (optional): Access the Properties panel to change the program icon, because by default it’s not fitted with one.

Step 12: Run the newly created shortcut, type down the administrator password you previously set, and press Enter. The program runs, and you don’t have to enter the password again for this application.

Removing the saved password: The password is now saved in the Windows Credentials Manager, and can be removed from there. It’s done by looking for the Credentials Manager utility via search (Win + S), clicking on Windows Credentials, expanding the Computer_nameAdministrator entry, and hitting Remove.

The third-party alternative

A much faster and easier way is to use RunAs Tool. The first launch requires you to write down the administrator password, after which you only need to drag target files over the main window. These can either be run from the program interface, or right-clicking items to create desktop shortcuts with admin privileges.

In conclusion

Bottom line is that the administrator prompt and UAC screen are good security measures, even if it gets frustrating to always have to write down the password to run specific programs. However, if other security measures have your back, then it’s probably safe to make a few exceptions, at least with frequently used applications that can’t really harm your PC.

Terbaru

  • Inilah Cara Zakat Crypto Kalian Bisa Jadi Pengurang Pajak Berdasarkan Aturan Resmi Pemerintah!
  • Inilah Perbandingan Airwallex vs Payoneer 2026: Jangan Sampai Profit Kalian Ludes Gara-Gara Biaya Admin!
  • Inilah Roadmap 7 Tahap Bangun Bisnis Digital dari Nol Biar Nggak Cuma Putar-Putar di Tempat!
  • Inilah Cara Tetap Gajian dari YouTube Meski View Masih Ratusan, Penasaran?
  • Inilah Alasan Akun TikTok Affiliate GMV 270 Juta Kena Banned Permanen!
  • Inilah Bahaya Astute Beta Server APK, Jangan Sembarang Klik Link Download FF Kipas 2026!
  • Inilah Bahaya Nonton Film di LK21 dan IndoXXI, Awas Data Pribadi dan Saldo Rekening Kalian Bisa Ludes!
  • Inilah Kronologi & Video Lengkap Kasus Sejoli Tambelangan Sampang Viral, Ternyata Gini Awal Mulanya!
  • Inilah Alasan Kenapa Koin Nego Neko Shopee Nggak Bisa Dipakai Bayar Full dan Cara Rahasia Dapetinnya!
  • Inilah Cara Menjawab Pertanyaan Apakah di Sekolahmu Sudah Ada IFP/PID dengan Benar dan Profesional
  • Inilah Fakta Isu Roblox Diblokir di Indonesia 2026, Benarkah Akan Ditutup Total?
  • Inilah Penyebab dan Cara Mengatasi FF Kipas My ID Verify UID Biar Akun Tetap Aman
  • Inilah Deretan HP RAM 8GB Harga di Bawah 2 Juta Terbaik 2026, Spek Dewa Tapi Nggak Bikin Kantong Jebol!
  • Contoh Cara Buat SK Panitia TKA 2026
  • Inilah Cara Download Point Blank ID Versi Terbaru 2026, Gampang Banget Ternyata!
  • Inilah Persiapan Lengkap Gladi Bersih TKA 2026 SD dan SMP: Jadwal, Teknis Proktor, dan Aturan yang Wajib Kalian Tahu
  • Inilah Aturan Lengkapnya, Apakah Zakat dalam Bentuk Barang Bisa Mengurangi Pajak Penghasilan Kalian?
  • Inilah Kenapa KBLI Sangat Penting Buat Bisnis Digital dan Gini Caranya Biar Kalian Nggak Salah Pilih Kode
  • Inilah Fitur Keren ONLYOFFICE Docs 9.3, Cara Baru Edit PDF dan Dokumen Lebih Efisien!
  • Inilah Cara Banjir Komisi Shopee Affiliate Hanya Dalam 7 Hari Saja
  • Cara Download Aplikasi BUSSID Versi 3.7.1 Masih Dicari dan Link Download Aman Mediafire
  • Inilah Cara Lengkap Mengajukan SKMT dan SKBK di EMIS GTK 2026, Biar Tunjangan Cair Tanpa Drama!
  • Inilah Kenapa Bukti Setor Zakat Kalian Harus Ada NPWP-nya, Jangan Sampai Klaim Pajak Ditolak!
  • Inilah Cara Jadi Clipper Video Sukses Tanpa Perlu Tampil di Depan Kamera
  • Inilah Cara Upload NPWP dan Rekening di EMIS GTK Madrasah Terbaru, Jangan Sampai Tunjangan Terhambat!
  • Inilah Fakta di Balik Video Ukhti Sholat Mukena Pink Viral yang Bikin Geger Media Sosial
  • Belum Tahu? Inilah Langkah Pengisian Survei Digitalisasi Pembelajaran 2026 Biar Nggak Salah
  • Ini Kronologi Video Viral Ibu Tiri vs Anak Tiri Ladang Sawit Tiktok
  • Inilah Caranya Update Chromebook Sekolah Agar Siap Digunakan untuk TKA SD dan SMP
  • Inilah Caranya Menghindari Mafia Kontraktor Renovasi Nakal Supaya Budget Nggak Boncos
  • How to Run Windows Apps on Linux: A Complete Guide to WinBoat, WINE, and Beyond
  • Build Your Own AI Development Team: Deploying OpenClaw and Claude Code on a VPS!
  • How to Measure Real Success in the Age of AI: A Guide to Software Metrics That Actually Matter
  • Kubernetes Traffic Tutorial: How to Create Pod-Level Firewalls (Network Policies)
  • This Is Discord Malware: Soylamos; How to Detect & Prevent it
  • How to Importing and Exporting Memory in Claude
  • How to Create Professional Business Guides and One-Pagers in Seconds with Venngage AI!
  • How to the OWASP Top 10 Security Risks, Attacking LLM
  • How to Create Visual Storytelling with Higgsfield Soul 2.0
  • How to Use the Tiiny AI Pocket Lab to Run Local Large Language Models
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme