Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Tutorial Windows: Run Apps as Admin Without Password Prompt from Standard Windows Accounts

Posted on October 16, 2015

Basic security measures in Windows are heavily related to the administrator account, without which you wouldn’t have much freedom to install or run specific programs, services, or video games.

Even if you’re logged into an administrator account, prompts still show up when running certain executables, but you’re not asked to write down the password again. The situation changes when running the same applications from a regular account, with the prompt showing up, requiring the administrator password.

This method is used to prevent others from messing up system configurations, or worse, allowing malicious content to infiltrate, even by accident. On the other hand, this prompt becomes frustrating when you frequently have to run a specific program with a regular account, even if it’s made to enhance security.

Luckily, there are methods of providing the right clearance for a target program, without disabling anything, but rather simply granting full administrator privileges to just that specific program. Some tweaking is required, but there’s also an app for that.

The Windows method

Important note: First of all, an elevated administrator account must be enabled for this method to work. Doing so is easy, but it’s highly recommended NOT to use it for everyday activities, since it’s fitted with unrestricted access to any area of your computer, every operation you perform, and isn’t even prompted by the UAC, which makes it an easy target for malicious content.

Step 1: Make sure you’re currently logged into an administrator account. Launch the Command Prompt with admin privileges. It’s easily done by right-clicking the Start Menu button and choosing the option from the menu.

Step 2: Regardless of the location, type in this command:

net user administrator /active:yes

Step 3: Close the Command Prompt and access the Control Panel.

Step 4: From the User Accounts section, follow the link to Change Account Type.

Step 5: Now, pick the new Administrator account, and choose to Create a Password.

Step 6: Fill in the corresponding fields for the password and hint fields, and press the Create Password button. You can close the Control Panel.

Step 7: Sign out of the current administrator account and log into the one you want to grant special permission to.

Step 8: Go to the location you wish to launch the program from, or stay on the desktop. Right-click an empty space, and choose to create a New Shortcut.

Step 9: A new prompt shows up. In the field where you need to Type The Location of The Item, write down this code:

runas /user:computer_nameAdministrator /savecred “C:application_pathexecutable_name.extension”

In this example, the code we had to write down looks like this:

runas /user:DESKTOP-N12V7FQAdministrator /savecred “C:Program Files (x86)IObitIObit UninstallerIObitUninstaller.exe”

Step 10: Press Next, and give the shortcut the name you see fit.

Step 11 (optional): Access the Properties panel to change the program icon, because by default it’s not fitted with one.

Step 12: Run the newly created shortcut, type down the administrator password you previously set, and press Enter. The program runs, and you don’t have to enter the password again for this application.

Removing the saved password: The password is now saved in the Windows Credentials Manager, and can be removed from there. It’s done by looking for the Credentials Manager utility via search (Win + S), clicking on Windows Credentials, expanding the Computer_nameAdministrator entry, and hitting Remove.

The third-party alternative

A much faster and easier way is to use RunAs Tool. The first launch requires you to write down the administrator password, after which you only need to drag target files over the main window. These can either be run from the program interface, or right-clicking items to create desktop shortcuts with admin privileges.

In conclusion

Bottom line is that the administrator prompt and UAC screen are good security measures, even if it gets frustrating to always have to write down the password to run specific programs. However, if other security measures have your back, then it’s probably safe to make a few exceptions, at least with frequently used applications that can’t really harm your PC.

Terbaru

  • Inilah Fakta di Balik Kasus Siswi 15 Tahun di Langkat yang Viral Jadi Tersangka Usai Bela Ayahnya
  • Inilah 7 HP Redmi Kamera Terbaik 2026 dengan Resolusi 200 MP, Kualitas Flagship Harga Tetap Irit!
  • Inilah Bahaya dan Cara Kerja Unlock FF Beta Server Account Apk Mobilitado yang Lagi Viral
  • Inilah 5 Laptop Lenovo Paling Awet dan Tangguh Buat Investasi Jangka Panjang Kalian
  • Inilah Kronologi Tragis Mahasiswa PNP Padang Ditemukan Meninggal di Kamar Kos 11 April 2026
  • Inilah Kenapa Akun WhatsApp Kalian Sedang Ditinjau dan Cara Mengatasinya Biar Normal Lagi
  • Inilah Kronologi Gadis Lampung Nekat Menyamar Jadi Pria Demi Lamar Kekasih di Sinjai yang Berujung Urusan Polisi
  • Inilah Kronologi Kecelakaan Beruntun Jalur Purworejo-Magelang 11 April 2026: Berawal Dari Rem Mendadak Karena Kucing Melintas
  • Inilah Kabar Mengejutkan OTT KPK Bupati Tulungagung Gatut Sunu Wibowo, Begini Kronologi dan Profil Lengkapnya
  • Inilah Mod HUD Minecraft 2026 yang Bikin Tampilan Game Kalian Makin Keren dan Informatif
  • Inilah Panduan Lengkap UM-PTKIN 2026: Jadwal, Cara Daftar, dan Tips Strategis Memilih Jurusan di UIN IAIN STAIN
  • Inilah Alasan Kenapa Tiny House di Sleman Makin Populer dan Cara Bangunnya dengan Budget 100 Jutaan
  • Inilah Alasan Kenapa Akun Instagram Wapres Gibran Sempat Follow Akun Judi Online, Ternyata Begini Faktanya!
  • Inilah Kronologi Lengkap Kasus Dugaan Penistaan Agama Injak Alquran di Lebak Banten yang Lagi Viral
  • Inilah Rekomendasi Instagram Downloader Terbaik 2026, Cara Download Reels dan Foto Paling Sat Set!
  • Inilah Alasan Kenapa Channel YouTube Kalian Gak Berkembang Meskipun Kontennya Udah Bagus
  • Inilah Cara Buka Situs yang Diblokir di Tahun 2026, Trik Rahasia Tanpa VPN!
  • Inilah Cara Menghilangkan Iklan di HP Xiaomi dan POCO Paling Ampuh Tanpa Root, Update April 2026
  • Inilah 7 Rekomendasi HP 1 Jutaan Terbaik yang Layak Kalian Lirik, Speknya Nggak Kaleng-Kaleng!
  • Inilah 7 Cara Mengembalikan Foto yang Terhapus Permanen di HP, Ternyata Masih Bisa Diselamatkan!
  • Inilah Cara Mengatasi Baterai Boros Setelah Update HyperOS yang Paling Ampuh
  • Inilah Pokémon Champions 2026, Game Battle Kompetitif Terbaru dan Cara Download-nya yang Perlu Kalian Tahu!
  • Inilah Doods Viral: Pengertian, Bahaya, dan Kenapa Kalian Harus Ekstra Waspada!
  • Gini Caranya Ngebangun Bisnis AI yang Menguntungkan dalam 48 Jam Saja!
  • Pengertian “He is Risen” Adalah?
  • Inilah Rekomendasi HP Snapdragon Paling Murah dengan RAM 8 GB Terupdate April 2026
  • Inilah 12 Kampus Negeri di Jogja yang Jarang Diketahui, Ternyata Banyak yang Kasih Kuliah Gratis!
  • Inilah Rekomendasi HP Tecno Kamera Terbaik 2026, Spek Gahar Harga Tetap Pelajar!
  • Apa itu PPU UTBK? Ini Rahasia Taklukkan Skor Tinggi di SNBT 2026 Tanpa Harus Menghafal!
  • Inilah Alasan Kenapa Lapisan Es Greenland Ternyata Bisa Bergerak Kayak Adonan yang Dipanaskan
  • Is it Time to Replace Nano? Discover Fresh, the Terminal Text Editor You Actually Want to Use
  • How to Design a Services Like Google Ads
  • How to Fix 0x800ccc0b Outlook Error: Step-by-Step Guide for Beginners
  • How to Fix NVIDIA App Error on Windows 11: Simple Guide
  • How to Fix Excel Formula Errors: Quick Fixes for #NAME
  • How to Use VoxCPM2: The Complete Tutorial for Professional Voice Cloning and AI Speech Generation
  • Complete tutorial for Creao AI: How to build smart AI agents that automate your daily tasks
  • How to Streamline Your Digital Workflow with TeraBox AI: A Complete Tutorial for Beginners
  • How to Run Google Gemma 4 Locally: A Beginner’s Guide to Tiny but Mighty AI Models
  • A Beginner Tutorial on Cloning Website Source Code Using ChatGPT and AI Logic Reconstruction
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme