Putting Screensavers Under Control

No matter how much you enjoy your favorite screensavers, sometimes they can be rather annoying. Don't like them interrupting your presentations? Hate them disturbing you watching movies? Look no further. This article will show you how to gain full control over your screensavers in no time.

There's no doubt screensavers bring a pleasant variety to your desktop. Not to mention they prevent your monitor from burn-ins. Still there are times they had better sit quiet and hadn't interfered with your work.

Demonstrating a slideshow, watching a movie, reading an article - all these activities and many others may leave your computer with no keyboard and mouse input for a few minutes. Depending on your preferred settings, two or three minutes of inactivity may be enough for a screensaver to start and interrupt your work when it shouldn't.

The obvious solution to the problem is disabling screensavers right before any of those activities. However, it's very likely you'll forget to do it. Furthermore, it's even more likely you'll forget to turn screensavers back on later, thus leaving yourself without their benefits for indefinite time.

Thankfully, we are not the first people who encountered this problem. Quite many different tools already exist to help you. They range from simple support for screensavers in some applications to universal and powerful tools to control them.

If screensavers interrupt you often when you watch movies, but otherwise don't bother you, you may find it sufficient to use a media player that has a built-in support for screensavers. For example, Winamp and The Playa have an option to prevent screensavers from starting while they play a movie. Consider using one of them or another media player having that option unless you are looking for a more versatile tool.

For those of you who'd like to have full control no matter what you do, there are many universal applications. This time we will talk about two of them.

If you want a program that is easy to use and that would allow you to disable screensavers quickly and then easily enable them, Hot Corners is right for you. It's a small tool letting you control screensavers in three ways:

  • by moving the mouse into one of the screen corners

  • by pressing a combination of keys on your keyboard

  • by clicking an icon in the system tray

You can set one screen corner for disabling screensavers and another for starting them. This way moving the mouse into the first corner will prevent any screensaver from starting. Moving the mouse into the second corner will start your default screensaver. Holding the mouse in any other place of your desktop will make screensavers behave in the usual manner. For you convenience, Hot Corners allow you to vary the size of the corners. This way you won't waste too much time positioning the mouse precisely.

Alternatively, you can set a pair of keyboard shortcuts to quickly disable or activate a screensaver. You may prefer this method if you extensively use the keyboard while working.

Another useful feature of Hot Corners is Power Management control. Not only it can prevent screensavers from starting, but it also won't let your monitor to go in power saving and power-off modes.

Hot Corners were created by South Bay Software, and are available for download from

http://www.southbaypc.com/hotcorners/

Another interesting tool is Galt Screen Control by Galt Technology. It definitely lacks the variety of screensaver control methods available in Hot Corners. Nevertheless, it has many other features you may find useful.

There is only one way to disable screensavers using Galt Screen Control. You will have to right click the application icon in the system tray and select the corresponding option.

But there's more in it than simply disabling screensavers. You can select an option that will disable them for 1/2, 1, 2, or 4 hours, giving you even finer control. This way you will never forget to enable screensavers back later. Galt Screen Control provides an easy and convenient way to launch or configure any installed screensaver. It requires you just two menu clicks. Furthermore, the tool can select a random screensaver when you ask it. Alternatively, it can do it on each program startup or on an hourly basis.

You can download Galt Screen Control from

http://www.southbaypc.com/hotcorners/

Now that I've shared these little secret tools with you, it's time to show your screensavers their real master. Don't waste a second! Put them under control!

About The Author

Roman Kramar is a software developer who enjoys writing screensavers as his time permits. Visit his site at http://www.southbaypc.com/hotcorners/ to find out more about screensavers and his work. http://www.southbaypc.com/hotcorners/

disinfecting cleaning services Arlington Heights ..
In The News:

The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.

Internet Relay Chat - A Basic Introduction

What is IRC?IRC is Internet Relay Chat. It is a... Read More

OEComplete ? A Personal Information Manager

OEComplete is a utility for managing the personal information of... Read More

Data Quality Best Practices for Salesforce.com

Executive SummaryAn effective plan for entering, cleaning and updating the... Read More

A Simple Computer Software Definition

What is Software?Software is a set of instruction written to... Read More

Navision Attain C/ODBC Crystal Report ? Customization Example

Microsoft Business Solutions Navision is main ERP application for European,... Read More

Razzle Dazzle Them

Once upon a time not so long ago, there was... Read More

Microsoft Great Plains Implementation in Russia ? Overview for Consultant

Microsoft Business Solutions Great Plains is very popular ERP platform... Read More

Microsoft Business Solutions VAR/Partner Selection ? Overview for IT Director/Manager/Controller

Microsoft Great Plains and Microsoft CRM become more and more... Read More

Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

When is a Software Engineer Not a Software Engineer?

The title of "software engineer" has got to be among... Read More

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

Popular Fleet Maintenance Programs

Some companies that are in need of fleet management may... Read More

Lotus Domino: Application Integration ? A Programmer View

There are two approaches for application integration:? Programmer's approach ?... Read More

What Stands Behind The Software Description?

With thousands of web pages added to the Net every... Read More

Software Development in 2005 - Back to the Future

2005 ? Back to the Future.What does the future hold?... Read More

Computer Phones ? Facts and Fallacies

The stakes are high when considering security, privacy, and savings,... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security ??" these days we???re... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

SpyBot - Search and Destroy versus Microsoft AntiSpyware (Beta).... My personal experiences...

Ok... Where to start?Well, I guess I will start at... Read More

Microsoft Great Plains on Ctree or Pervasive SQL ? What to Do ? Tips for IT Manager

As you probably know, when Microsoft purchased Great Plains Software... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

Microsoft Great Plains Beverage Production & Distribution ? Implementation & Customization Highlight

Microsoft Business Solutions Great Plains has many years of successful... Read More

Tripwire for Linux File Integrity

What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More

How to Make Attractive and Effective PowerPoint Presentations

Microsoft PowerPoint has dramatically changed the way in which academic... Read More

bathroom cleaning service Mundelein ..