Tip of the Week: How to Add User Profile Management to Google Chrome
Google’s web browser Chrome has a ton of nifty features that users can take advantage of. One of them is the ability to “lock” browser windows, and to allow only certain guest users access to the Internet through Google Chrome.
Why have you never seen this function before? It’s simple, really - the mad scientists at Google probably felt like their experimental add-ons weren’t ready for the world to use yet, and they demand use from only the best, brightest, and bravest individuals. By this, we are referring to the disclaimer at the top of the web page, chrome://flags:
While your computer might not spontaneously combust, these add-ons do warn the users that they may come with certain unwanted functions, such as deleting browser history, private information, security information, and randomly disappearing at any given time. This means that you should always be using the most up-to-date version of Chrome, as well as using a quality antivirus software and firewall solution.
Here are the steps you must take to lock your Google Chrome browser window:
Step 1: Finding the Right Add-On
In order to locate the list, visit the chrome://flags web page that we mentioned above. This will bring up a list of all experimental features that are associated with Google Chrome. You are looking for Enable new profile management system:
It’s a fair ways down the page, so to save yourself a lot of time and reading, simply use the CTRL+F (find) function to locate the correct feature.
Step 2: Enabling the Add-On
Once the not-so-hard part of finding the appropriate add-on is over with, all you need to do is click on Enable. Then, all you need to do is re-launch Google Chrome and the extension will be active.
You’ll notice that the sign-in screen looks similar to those used by Microsoft Windows operating systems. You select a user and enter in your Google account password, and you’re all set to browse the Internet. This helps protect your web browser from those who would use it to look at peculiar… things, without your permission.
Kinks in the System
As with most software add-ons, there are some undesirable features that come with this basic user login system. For those who have two Google accounts associated with their system user profile, you will not be able to logout of your primary account to use Google Drive with another one. This makes it difficult to move between two accounts at will, and can be infuriating for those who must use more than one account. Furthermore, the primary Google account for the browser would save open windows and tabs, but the secondary accounts would not, instead opening up to Google’s home page.
Of course, if you don’t like the way that something is working, you can always remove it by visiting chrome://flags and clicking Disable, then relaunching Google Chrome.
This add-on is a good security measure for your browser, but keep in mind that, while using a Chrome add-on is a good idea to keep unwanted users off of your computer, you will still want to have an enterprise-level network security solution in place to safeguard against malware and hackers.
- Tip of the Week: 3 Ways to a Faster Boot Time Your time is valuable, so you don’t have time to waste on waiting for your Windows operating system to boot up. In the interest of saving time, today’s tip will go over three ways to speed up your Windows 10 boot time. Of course, you should always check with IT to make sure it is okay before you ...
- Google Duplex Can Make Calls for You, and More At Google I/O 2018, the latest occurrence of Google’s convention for developers, a stunning new technology was demonstrated to those in attendance. Called Google Duplex, it adds a new level of utility and capability to the Google Assistant, in that it enables the Google Assistant to make phone calls...
- 4 Internal Threats Every Business Owner Should Understand In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their comp...
- Tip of the Week: Evaluating and Assessing Risk Whenever you decide to implement something in your information technology strategy, you accept some level of risk. Understanding and managing this risk is crucial to your business’ success. For this week’s tip, we’ll review how to manage your IT risks and what your options are. Understanding IT R...
- Tip of the Week: How to Spot a Scam What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Woul...
- IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...