Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Tutorial Windows: This Is How Windows 10 Lets You Log In

Posted on August 10, 2015

Every iteration of Windows brought about something new in both functionality and visuals, whether you liked it or not. Some features can be disturbing or created a lot of fuss around the fan community, but it seems Microsoft actually listened to (some) feature requests when building Windows 10.

Before you get to enjoy everything you like about this operating system, you need to configure one or more users that can reach the desktop on your computer. If this is the case, each is fitted with its own password to prevent data theft, and let every user have their own personalized virtual space.

The common security method used for an account is a password, and this takes us to the extra methods you can use in Windows 10. Some might seem suspicious, while others reduce your effort to power up your computer. You’re free to use the one you like, as well as different methods for different accounts. Regardless of your intentions, we present the login methods in Windows 10.

Windows 10 login methods

1 ~ The no-password

Among the last steps of the Windows 10 installation process is setting up an account to be able to reach the desktop. You’re recommended to use a Microsoft account to fully activate all features and benefit from everything Windows 10 has to offer.

On the other hand, a home computer used for rudimentary tasks or with no Internet connection doesn’t really need a Microsoft account. Luckily, you can just press Skip when you’re asked to add it.

This creates a local account for which you’re not forced to add a password. It is with full administrative privileges and takes you directly to the desktop after you fire up your computer, without keeping you stuck in a login screen or asking for any credentials.

Note: As you can imagine, using this method is indeed the fastest login method, but it’s also the most dangerous, since anyone can access everything stored on your computer when you’re away.

Limitations:

-> security risks since anyone can login;

-> you need to create a username and account for each PC you use;

-> downloading apps through the store is not possible;

-> settings and files won’t be synced across multiple PCs.

Note: If you already have a Microsoft account you’re using to log in, you can add a local account.

Adding another local user:

Step 1: Press Win + S to search for settings to Add, Edit, or Remove Other Users.

Step 2: In the Other Users section, choose to Add Someone Else to This PC.

Step 3: To make it a local account, follow the bottom link in the new window that says The Person I Want To Add Doesn’t Have an Email Address.

Step 4: Now choose to Add a User Without a Microsoft Account.

Step 5: Write down a name for Who’s Going To Use This PC and press Next.

Step 6: After this is done, you’re returned to the account settings screen. Locate the account you’ve just created and Change Account Type.

Step 7: Select Administrator from the Account Type drop-down menu and press OK to confirm changes.

Note: You can delete all other accounts if you only plan to use this local one.

2 ~ The automatic login

Truth be told, it’s best you use Windows with a Microsoft account so that you can benefit from the whole experience as it was meant to. If this is the case, you need to use it each time you want to reach the desktop.

There is a way you can make Windows remember your password and bring you to the desktop without stopping in the lock screen first. Then again, others can still access all of your data this way.

You’re asked to set up your Microsoft account even from the Windows installation process, but you can also configure it later on. Turning off password request can be done in two ways. One is for each user by ticking a simple option, while the other takes you through some registry tweaks. Either way, you can find the complete guide on automatic login here.

3 ~ The PIN (Personal Identification Number)
 

Needless to say that you’re already familiar with the four-digit identification method that’s used in nearly all domains of activity and almost all security-related data. Your phone’s SIM card is based on a PIN code, and so is your credit card. The same goes for alarm systems and now you can even use a PIN for your Windows account.

How in the world is a string of four characters of the same type stronger, or even a bit safer than my twenty-eight-character password that has lower and higher caps, numbers, and symbols?

In case you haven’t noticed during the Windows installation, you’re recommended to add a PIN to your Microsoft account. Don’t forget that you still need to provide a password. As such, the answer is simple:

The PIN is used to add an extra layer of security to your existing password but also saves you time and effort when trying to login to Windows. Thus, your Microsoft account security key is enforced, rather than replaced with a simpler type.

If you didn’t follow Microsoft’s recommendation in the installer, you can find a guide on how to add PIN login method here.

4 ~ The Picture

The last method we’re going to talk about and also the last method among sign-in options is to use a picture. You don’t necessarily need to use a Microsoft account to be able to log in with this method, but you simply require a password to use as backup.

With this method, you are able to reach the desktop by performing a series of gestures on a specific picture that’s supposed to remind you of the pattern. This method is just right to use with tablets, phones, and other touch supported devices, but it also works with the mouse.

Setting up a picture password:

Step 1: Add a password to your account.

Step 2: Use Win + S to access Sign-In Options.

Step 3: In the Picture Password section, choose to Add this method.

Step 4: Write down the password to confirm your identity, and then Choose Picture on the left pane.

Hint: Pick something on which is easy to make a pattern, because gestures are not shown, nor hinted.

Step 5: Draw a combination of lines, taps, and circles to make a total of three gestures.

Step 6: Repeat them to confirm and save changes. The login screen uses this method, so be sure to remember the exact gestures and locations.

In conclusion

With all the concern regarding the security of your personal files and info, it’s a good way to have more than one method to access your credentials. Although we would have loved to see face detection among sign-in options, these are more than enough to keep hackers a bit busy. Nonetheless, developers also made it possible to Log Into Windows with a Smile, or through smartphone-like patterns.

Terbaru

  • Inilah Cara Daftar Kuliah di Universitas Al-Azhar Mesir 2026 Lewat Jalur Resmi Kemenag
  • Inilah Daftar 20 PTN Terbaik Indonesia Versi Webometrics 2026, Kampus Impian Kalian Ada Nggak?
  • Inilah Profil Donny Sucahya, Sosok Pengusaha Muda yang Viral Karena Bisnis dan Pernikahannya
  • Inilah Alasan Kenapa Belalang Daun Bisa Berubah Warna dari Pink ke Hijau, Ternyata Mirip Daun!
  • Inilah Kenapa eBay Error dan Mengenal The Hacktivist Group 313 yang Mengklaim Bertanggung Jawab Atas Gangguan Global Tersebut
  • Inilah Alasan Kenapa eBay Error dan Sampai Kapan Gangguan Ini Berlangsung
  • Inilah Sosok Karyn Putri dan Alasan Video Viral IKEA Bikin Geger Netizen Soal Etika Self Service
  • Inilah Cara Mengatasi Error 3302 Pinterest di iPhone Biar Bisa Save Gambar Lagi
  • Inilah Jadwal Maintenance Pokemon HOME 27 April 2026 dan Alasan Kenapa Kalian Nggak Bisa Login Sementara
  • Inilah Cara Mengatasi Error Code 4 YouTube dan Penyebab Video Tidak Bisa Diputar
  • Inilah Cara Daftar Program Bina BNI Kanwil 08, Peluang Karir Perbankan Menarik Buat Kalian Para Fresh Graduate!
  • Inilah Arti Kenapa Nyak yang Lagi Viral, Simak Penjelasan Lengkap dan Cara Pakainya!
  • Inilah Arti Haji Mabrur dan Mabruroh Serta Kumpulan Doa dan Tradisi Walimatul Safar yang Penting Kalian Pahami
  • Inilah BUSSID Mod Terbaru 2026, Rahasia Bikin Pengalaman Berkendara Jadi Lebih Realistis dan Seru!
  • Inilah Kronologi Kasus Della Septiani vs Showroom BYD Denpasar yang Berujung Somasi, Pelajari Biar Nggak Kena Masalah Hukum!
  • Inilah Cara Mendapatkan FF Vault Banyak dan Gacor Biar Akun Kalian Jadi Sultan Tanpa Risiko Banned!
  • Inilah Arti VAT Id di TikTok dan Cara Mengisinya Supaya Komisi Kalian Cair Tanpa Potongan Besar
  • Inilah Arti MD di Nama Mahfud MD, Ternyata Bukan Gelar Dokter Lho!
  • Inilah Apa Itu Mata Delay di Mobile Legends yang Bikin Geger MPL ID S17: Trik Rahasia Karss NAVI Lawan Geek Fam!
  • Inilah Jadwal dan Lokasi Pemadaman Lampu Serentak Jakarta 25 April 2026, Yuk Ikut Berpartisipasi!
  • Inilah Alasan Mengapa Spanduk “Shut Up KDM” Muncul Saat Laga Persib vs Arema di GBLA
  • Inilah Kenapa Akun TikTok Hilang Tiba-tiba dan Cara Memulihkannya dengan Cepat
  • Inilah 7 Keterampilan Penting yang Wajib Kalian Miliki Supaya Sukses Belajar Online Tanpa Rasa Pusing
  • Inilah Update Terbaru Kasus Video Asusila Pasangan Bandar Batang yang Kini Masuk Tahap Penyidikan
  • Inilah 9 Aplikasi Penghasil Saldo DANA Tercepat dan Terbukti Membayar Tanpa Perlu Deposit
  • Inilah Cara Mengaktifkan Fitur Vertical Tab di Google Chrome Biar Tampilan Browser Kalian Makin Lega dan Rapi
  • Inilah Alasan Kenapa elementary OS Adalah Pilihan Paling Pas Buat Pengguna macOS yang Ingin Coba Linux
  • Inilah Alasan Kenapa Windows Server Kalian Restart Terus Setelah Update April 2026
  • Inilah Alasan Layar TV Kalian Sering Kedip Hitam Saat Main Game dan Cara Mengatasinya
  • Inilah Rekomendasi HP Redmi Note RAM 12 GB dan Koneksi 5G Paling Worth It Buat Kalian
  • Is it Time to Replace Nano? Discover Fresh, the Terminal Text Editor You Actually Want to Use
  • How to Design a Services Like Google Ads
  • How to Fix 0x800ccc0b Outlook Error: Step-by-Step Guide for Beginners
  • How to Fix NVIDIA App Error on Windows 11: Simple Guide
  • How to Fix Excel Formula Errors: Quick Fixes for #NAME
  • How to Master Claude & NotebookLM to Boost Research and Productivity
  • How to create professional design prototypes and presentations with the power of Claude Design & Figma
  • How to Master Claude Code 2.0: The Ultimate Guide to AI Automation
  • How to Create Consistent AI-Generated Short Films and Assets with Seedance 2.0
  • How to create stunning sci-fi AI movie visuals like a pro With Seedance 2.0
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme