Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Tutorial Windows: Run Apps as Admin Without Password Prompt from Standard Windows Accounts

Posted on October 16, 2015

Basic security measures in Windows are heavily related to the administrator account, without which you wouldn’t have much freedom to install or run specific programs, services, or video games.

Even if you’re logged into an administrator account, prompts still show up when running certain executables, but you’re not asked to write down the password again. The situation changes when running the same applications from a regular account, with the prompt showing up, requiring the administrator password.

This method is used to prevent others from messing up system configurations, or worse, allowing malicious content to infiltrate, even by accident. On the other hand, this prompt becomes frustrating when you frequently have to run a specific program with a regular account, even if it’s made to enhance security.

Luckily, there are methods of providing the right clearance for a target program, without disabling anything, but rather simply granting full administrator privileges to just that specific program. Some tweaking is required, but there’s also an app for that.

The Windows method

Important note: First of all, an elevated administrator account must be enabled for this method to work. Doing so is easy, but it’s highly recommended NOT to use it for everyday activities, since it’s fitted with unrestricted access to any area of your computer, every operation you perform, and isn’t even prompted by the UAC, which makes it an easy target for malicious content.

Step 1: Make sure you’re currently logged into an administrator account. Launch the Command Prompt with admin privileges. It’s easily done by right-clicking the Start Menu button and choosing the option from the menu.

Step 2: Regardless of the location, type in this command:

net user administrator /active:yes

Step 3: Close the Command Prompt and access the Control Panel.

Step 4: From the User Accounts section, follow the link to Change Account Type.

Step 5: Now, pick the new Administrator account, and choose to Create a Password.

Step 6: Fill in the corresponding fields for the password and hint fields, and press the Create Password button. You can close the Control Panel.

Step 7: Sign out of the current administrator account and log into the one you want to grant special permission to.

Step 8: Go to the location you wish to launch the program from, or stay on the desktop. Right-click an empty space, and choose to create a New Shortcut.

Step 9: A new prompt shows up. In the field where you need to Type The Location of The Item, write down this code:

runas /user:computer_nameAdministrator /savecred “C:application_pathexecutable_name.extension”

In this example, the code we had to write down looks like this:

runas /user:DESKTOP-N12V7FQAdministrator /savecred “C:Program Files (x86)IObitIObit UninstallerIObitUninstaller.exe”

Step 10: Press Next, and give the shortcut the name you see fit.

Step 11 (optional): Access the Properties panel to change the program icon, because by default it’s not fitted with one.

Step 12: Run the newly created shortcut, type down the administrator password you previously set, and press Enter. The program runs, and you don’t have to enter the password again for this application.

Removing the saved password: The password is now saved in the Windows Credentials Manager, and can be removed from there. It’s done by looking for the Credentials Manager utility via search (Win + S), clicking on Windows Credentials, expanding the Computer_nameAdministrator entry, and hitting Remove.

The third-party alternative

A much faster and easier way is to use RunAs Tool. The first launch requires you to write down the administrator password, after which you only need to drag target files over the main window. These can either be run from the program interface, or right-clicking items to create desktop shortcuts with admin privileges.

In conclusion

Bottom line is that the administrator prompt and UAC screen are good security measures, even if it gets frustrating to always have to write down the password to run specific programs. However, if other security measures have your back, then it’s probably safe to make a few exceptions, at least with frequently used applications that can’t really harm your PC.

Terbaru

  • Inilah Penemuan Terbaru yang Mengungkap Bahwa Sunburn Ternyata Disebabkan Oleh Kerusakan RNA
  • Inilah Alasan Kenapa Manusia Lebih Sering Hamil Satu Bayi daripada Kembar Menurut Penelitian Terbaru
  • Inilah Syarat dan Cara Pendaftaran IMEI Internasional Mulai Mei 2026
  • Bocoran Spek Samsung Galaxy S27 Ultra Nih, Kamera 3X Hilang + Teknologi AI
  • Inilah Perbedaan Motorola G47 dan Motorola G45, Cuma Kamera 108 Megapiksel Doang?
  • Update Baru Google Gemini: Bisa Bikin File Word, PDF, Excel secara Otomatis
  • Rekomendasi Motor Listrik 2026 Anti Mogok!
  • Ini Loh Honda Vision 110, Motor Baru Seharga Beat & Rangka eSAF Khusus Pasar Eropa
  • Inilah Mobil-Mobil Paling Cocok Transisi ke Bioetanol E20 dan Biodiesel B50!
  • Inilah Ternyata Batas Minimal Daya Cas Mobil Listrik di Rumah
  • DJP Geser Batas Akhir Lapor Pajak Sampai 31 Mei 2026
  • PKB Tanggapi Dingin Usul Yusril Ihza Mahendra Soal Parliamentary Treshold 13 Kursi
  • LPTNU Kritik Keras Rencana Penutupan Prodi: Kenapa Tidak Komprehensi & Berbasis Problematika Nyata?
  • Gus Rozin PWNU Jawa Tengah Setuju Cak Imin, Konflik PBNU bikin Warga Kesal dan Tidak Produktif
  • Pengamat: Prabowo Harus Benahi KAI, Aktifkan juga Jalur Kereta Lama & Baru
  • Sekjend PBNU: Jadwal Muktamar Usulan PWNU Sejalan Hasil Rapat Pleno & Rais Aam
  • PKB Desak Hukuman Maksimal Kasus Little Aresha & Evaluasi Total Sistem Penitipan Anak secara Nasional
  • PKB Usul Modernisasi Sistem Kereta dan CCTV di Kabin Masinis, Setuju?
  • Menteri PPA Arifah Fauzi Minta Maaf Soal Polemik Pindah Gerbong Wanita di KRL
  • Cara Kirim Robux Mudah di Roblox Beli Skin Shirt Preview
  • Kronologi kasus dugaan penyebaran konten asusila oleh anak anggota DPRD Kutai Barat?
  • Inilah Alasan Kenapa Gelembung Air di Luar Angkasa Bisa Jadi Eksperimen Fisika yang Keren Banget
  • Inilah Contoh Naskah Doa Upacara Hardiknas 2026 yang Syahdu dan Penuh Makna
  • Inilah 10 Peringkat SMP di Daerah Istimewa Yogyakarta Berdasarkan Hasil TKA TKAD 2025/2026 Terbaru
  • Inilah Cara Download FF Beta Versi Terbaru 2026, Lengkap Dengan Cara Daftar Advanced Server Resmi
  • Inilah Cara Menghilangkan YouTube Shorts di Beranda Biar Nggak Menghambat Scrolling Kalian!
  • Inilah Kabar Gembira Program Magang Nasional 2026, Kuota Naik Drastis Jadi 150 Ribu Peserta!
  • Inilah House of Amartha: Mengenal Bisnis Thariq Halilintar di Balik Pernikahan Mewah El Rumi dan Syifa Hadju
  • Inilah Cara Kuliah S1-S2-S3 Gratis dan Cepat Lewat Beasiswa BIB Kemenag Jalur Akselerasi 2026
  • Inilah Aturan Baru Penugasan Guru Non-ASN 2026, Nasib Kalian Ditentukan Sampai Tanggal Ini!
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Transform Your Windows 11 Interface into a Sleek and Modern Aesthetic Masterpiece
  • How to Create Viral Motivational YouTube Videos Using Only Free AI
  • How to Create High-End Cinematic Ads and Viral Content with Seedance 2.0
  • How OpenAI is Taking the Lead Again with GPT 5.5 and Codex
  • How to Run a 27B Parameter AI Model on a Single Consumer GPU with Llama DeFlash
  • This is Elon Musk’s Massive Grok 5 and AGI Roadmap
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme