{"id":5,"date":"2010-02-18T11:23:26","date_gmt":"2010-02-18T16:23:26","guid":{"rendered":"http:\/\/blogs.butler.edu\/butlerlib\/?p=5"},"modified":"2010-04-15T08:49:52","modified_gmt":"2010-04-15T13:49:52","slug":"your-computers-security","status":"publish","type":"post","link":"https:\/\/blogs.butler.edu\/butlerlib\/2010\/02\/your-computers-security\/","title":{"rendered":"Your Computer&#8217;s Security"},"content":{"rendered":"<p>Hello all.<\/p>\n<p>I just wanted to take a second to remind everyone that  we all should have our screen savers set to require passwords to get  back in. If your computer goes to screen saver and when you move your  mouse you get right onto your computer where you left it, <strong>you are not  secure!<\/strong><\/p>\n<p>To set up this function, minimize everything on your  desktop, then right-click on the wallpaper and pick Properties. Choose  the Screen Saver tab and make sure there&#8217;s a check mark next to &#8220;<strong><span style=\"font-family: Courier New\">On resume, password protect<\/span><\/strong>.&#8221; Then click  OK.<\/p>\n<p>With this set up correctly, you won&#8217;t have to worry about  getting back to your office to log off your computer if you&#8217;re not there  at the end of the day. Or even when you walk away from your computer  for a few minutes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello all. I just wanted to take a second to remind everyone that we all should have our screen savers set to require passwords to get back in. If your computer goes to screen saver and when you move your mouse you get right onto your computer where you left it, you are not secure! [&hellip;]<\/p>\n","protected":false},"author":127,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[196],"tags":[214,246,171,215],"class_list":["post-5","post","type-post","status-publish","format-standard","hentry","category-technology-issues","tag-computers","tag-screen-savers","tag-security","tag-technology"],"_links":{"self":[{"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/posts\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/users\/127"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":2,"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/posts\/5\/revisions"}],"predecessor-version":[{"id":13,"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/posts\/5\/revisions\/13"}],"wp:attachment":[{"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/categories?post=5"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.butler.edu\/butlerlib\/wp-json\/wp\/v2\/tags?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}