	{"id":49,"date":"2007-10-26T18:28:15","date_gmt":"2007-10-27T01:28:15","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/10\/26\/learn-about-user-accounts-in-leopard\/"},"modified":"2019-10-01T07:47:07","modified_gmt":"2019-10-01T14:47:07","slug":"learn-about-user-accounts-in-leopard","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/","title":{"rendered":"Learn how to master user accounts in Leopard"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif\" alt=\"\" \/><\/p>\n<p>User accounts are an integral part of Mac OS X, but for many people, they&#8217;re a source of confusion. No more, thanks to Kirk McElhearn&#8217;s straightforward explanations, which help you understand and manage all the accounts for people who use your Mac, even if the only person is you. You&#8217;ll learn how to create the right types of accounts for the different people who use your Mac, why you need at least two accounts, and what you can do with the many new options in Leopard&#8217;s parental controls. Kirk shows you how to set up a troubleshooting account to solve problems, use Fast User Switching, share files between users, manage login and startup items, and more. Kirk even reveals tricks for sharing music and photos among multiple users on your Mac using iTunes and iPhoto.<\/p>\n<p>Buy this ebook from <a href=\"http:\/\/www.takecontrolbooks.com\/leopard-users.html\">TidBITS<\/a> for only $10.<\/p>\n<p>Intego has partnered with TidBITS for this ebook, offering a 25% off coupon for <a href=\"https:\/\/www.intego.com\/contentbarrier\/\"> Intego ContentBarrier X4 <\/a> or <a href=\"https:\/\/www.intego.com\/contentbarrierDP\/\"> Intego ContentBarrier DP<\/a>. The author points out just how much more useful ContentBarrier is than the built-in parental controls. So if you buy this ebook, you&#8217;ll save more than its cost on a purchase of ContentBarrier.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>User accounts are an integral part of Mac OS X, but for many people, they&#8217;re a source of confusion. No more, thanks to Kirk McElhearn&#8217;s straightforward explanations, which help you understand and manage all the accounts for people who use your Mac, even if the only person is you. You&#8217;ll learn how to create the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"User accounts are an integral part of Mac OS X, but for many people, they&#039;re a source of confusion. No more, thanks to Kirk McElhearn&#039;s straightforward\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn how to master user accounts in Leopard - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"User accounts are an integral part of Mac OS X, but for many people, they&#039;re a source of confusion. No more, thanks to Kirk McElhearn&#039;s straightforward\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-27T01:28:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-01T14:47:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/\",\"name\":\"Learn how to master user accounts in Leopard - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#primaryimage\"},\"datePublished\":\"2007-10-27T01:28:15+00:00\",\"dateModified\":\"2019-10-01T14:47:07+00:00\",\"description\":\"User accounts are an integral part of Mac OS X, but for many people, they're a source of confusion. No more, thanks to Kirk McElhearn's straightforward\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn how to master user accounts in Leopard\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Learn how to master user accounts in Leopard\",\"datePublished\":\"2007-10-27T01:28:15+00:00\",\"dateModified\":\"2019-10-01T14:47:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#webpage\"},\"wordCount\":203,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif\",\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"User accounts are an integral part of Mac OS X, but for many people, they're a source of confusion. No more, thanks to Kirk McElhearn's straightforward","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/","og_locale":"en_US","og_type":"article","og_title":"Learn how to master user accounts in Leopard - The Mac Security Blog","og_description":"User accounts are an integral part of Mac OS X, but for many people, they're a source of confusion. No more, thanks to Kirk McElhearn's straightforward","og_url":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-10-27T01:28:15+00:00","article_modified_time":"2019-10-01T14:47:07+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/","name":"Learn how to master user accounts in Leopard - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#primaryimage"},"datePublished":"2007-10-27T01:28:15+00:00","dateModified":"2019-10-01T14:47:07+00:00","description":"User accounts are an integral part of Mac OS X, but for many people, they're a source of confusion. No more, thanks to Kirk McElhearn's straightforward","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Learn how to master user accounts in Leopard"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Learn how to master user accounts in Leopard","datePublished":"2007-10-27T01:28:15+00:00","dateModified":"2019-10-01T14:47:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#webpage"},"wordCount":203,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-about-user-accounts-in-leopard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/tco.gif","articleSection":["Apple"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-N","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49\/revisions"}],"predecessor-version":[{"id":90100,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49\/revisions\/90100"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}