Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up User Permissions For Google Chrome

b2ap3_thumbnail_chrome_flat_400.jpgAre you looking for a way to manage Internet use on a single computer that’s being used by multiple people? To help you keep your browsing history and settings intact and keep unwanted users from accessing the web, Google has a free add-on available for Chrome created for just this very purpose.

With this add-on, you gain the ability to essentially lock Chrome and only grant access to those you’ve given permission to use it. Although, this add-on is experimental, so be sure to keep potential issues in mind:

How to Install this Helpful Add-On for Google Chrome:
Open Chrome and enter chrome://flags in the search bar, now hit enter. From here, you will see a list of all the experimental add-ons available for Chrome. The one you want to track down is “Enable new profile management system.

profile management

With the long list of add-ons before you, you’ve got the option to find the needed add-on a little quicker by using the CTRL+F (find) function.

Once you’ve located the add-on, click Enable. Next, close Chrome and open it again. You will now find the extension to be active. You can tell that the add-on is active because the sign-in screen will have a similar look to the sign-in screen used for Windows.

To login to your Chrome browser, select the Google account that you want to use, or enter the login credentials of an another account. Once logged in, you will be all set to browse the Internet like you normally would. Be sure to logout when you’re done. This will prevent other users from browsing Chrome with your Google account and messing with your settings.

Limitations of the Add-On
This add-on works great if you’re logged in and working with a single Google account. However, this add-on is designed to only work in conjunction with a single Google account, which means you will be unable to use a Google App, like Google Drive, under an account different than the one associated with the add-on. Therefore, this add-on isn’t ideal for users that routinely cycle through different Google accounts in single browsing sessions.

If you’ve installed the add-on and you don’t like how it limits your use of multiple Google accounts, then you can simply remove it by going to chrome://flags, finding the add-on, and clicking Disable.

This add-on is a great solution to keep unwanted people from using Chrome on your computer, but it’s doesn’t come close to protecting people from messing with other applications and settings on your PC, or deterring hackers. For a more comprehensive network security solution, call Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Tech Term Saving Money Holiday Social Media Chrome Gadgets Virtualization Managed Service Automation Microsoft Office Managed IT Services Artificial Intelligence Computers Facebook Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Internet of Things Office 365 Telephone Systems Remote Information Technology Managed Service Provider Covid-19 Spam Alert Information Bandwidth Employer-Employee Relationship Recovery Router Social Engineering BDR Mobility Mobile Computing Password Money App Application History Encryption Applications Data Breach Human Resources Big Data Law Enforcement Remote Monitoring Apps Office Tips Data Storage Patch Management Training VPN Government Remote Computing Blockchain Private Cloud Paperless Office Mobile Office How To Managed IT Bring Your Own Device WiFi Data Management IT solutions Work/Life Balance Entertainment Infrastructure Website Voice over Internet Protocol Budget Wireless Vulnerability Windows 7 Word Gmail Google Drive Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Flexibility Marketing Cleaning Risk Management Hacker USB Conferencing End of Support The Internet of Things Lithium-ion battery Scam Education Physical Security Safety Data Protection Sports HIPAA Vendor Redundancy Managed Services Vendor Management Firewall Keyboard Display Virtual Reality Apple Employee/Employer Relationship RMM Social Telephone System Staff Software as a Service User Error Save Time Machine Learning Meetings Remote Work Connectivity Digital Signage Retail Hard Drives Instant Messaging Google Docs Excel Hiring/Firing Identity Theft Printer Robot Computing Infrastructure Going Green Bluetooth Biometrics Virtual Desktop Procurement Net Neutrality Workplace Strategy Battery Augmented Reality Shadow IT Fraud DDoS Help Desk Legal Business Intelligence Printing IT Consultant SharePoint Remote Worker Audit Internet Exlporer Worker Humor IT Management Cryptocurrency Managed Services Provider Customer Service PDF Botnet Database IT Plan Environment Comparison Fax Server Proactive IT Remote Workers Unsupported Software CES Best Practice Processor YouTube Charger SaaS Business Technology Black Market Content Management Compliance Hard Drive Access Control OneNote Computer Care Network Congestion Virtual Assistant Current Events eWaste Document Management Telephony Virus Authentication Solid State Drive Wireless Technology Samsung Computing How to Unified Threat Management Downtime Computer Accessories Value Data storage Update Electronic Medical Records Wearable Technology Automobile Spam Blocking Screen Mirroring HVAC Loyalty Google Apps Dark mode Trend Micro SMS Default App Frequently Asked Questions Monitor Analysis Books Procedure Saving Time Running Cable Mobile Administrator Windows 10s Devices Google Search Cast Enterprise Content Management Memory dark theme Shopping AI IT Infrastructure Tip of the week MSP Reputation webinar Accountants Streaming Media Emergency Public Cloud Thought Leadership Tech Support Employer Employee Relationship Credit Cards FinTech Content Professional Services Microchip Bing Printer Server Techology Password Management Laptop Assessment Password Manager Social Network Multi-Factor Security Investment Windows Server 2008 Customers Twitter Science Employees Employee/Employer Relationships Audiobook Tools Search Engine ISP NIST Touchpad Television Business Mangement Windows 365 Trending Video Conferencing ROI Smart Tech Customer Relationship Management Advertising Addiction Amazon Sales Bitcoin Distributed Denial of Service Politics Shortcuts Cryptomining Analyitcs Public Computer Recycling Point of Sale Personal Notifications Transportation Supply Chain Management Regulations Wiring Programming Practices Computer Fan Cache Rootkit Amazon Web Services Monitoring Batteries Safe Mode Criminal Windows 8.1 Digitize Benefits Windows Server 2008 R2 Consultant Antivirus GDPR Relocation Workers Hosted Computing FENG Wireless Internet Windows 8 Online Shopping Customer relationships Analytics Manufacturing IT service Video Games File Sharing IBM Email Best Practices IT Assessment Smart Technology Specifications Best Available Worker Commute Flash Camera Inventory Wire Tablet Evernote Computer Tips Managed IT Service WIndows 7 Experience Security Cameras OneDrive Biometric Security Domains Scalability Software Tips Supercomputer Virtual CIO Travel Millennials Peripheral Business Owner Sync Printers Emails Maintenance Smart Office NarrowBand Wireless Charging Digital Security Cameras Using Data IaaS Copiers 5G Search Bloatware Two Factor Authentication Workforce Quick Tip Virtual Private Network iPhone Netflix Smartwatch PowerPoint Root Cause Analysis Windows Media Player Tablets Cables Ergonomics User Development OLED HBO Entrepreneur Knowledge Music Telecommuting PCI DSS Virtual Machine Skype Project Management Files Nanotechnology Employee Shortcut Data loss Chromecast Cortana 2FA Fiber Optics Managing Stress Messaging Cabling Outlook Cost Management Leadership Digital Signature Troubleshooting Uninterrupted Power Supply Policy Hypervisor Start Menu Warranty Cameras Social Networking Colocation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code