What to Do if All Screensavers Fun is Grayed Out?

Finally, you have some time to personalize your desktop with an interesting screensaver. But wait... What's that? Why in the world the system prevents you from doing that? The screensaver controls are grayed out or, even worse, the whole Screensaver tab is missing from Display Properties. Don't panic! This article will help you change things for the better.

I've found that people who use Windows 2000/XP often can't enjoy screensavers because their system is configured in a way that prevents them from doing that.

Unless you are very experienced in administrating Windows, you may stuck with the problem. If you ever found yourself or your friend in a situation like this, add this article to your arsenal of screensaver tips.

Most of the time people encounter the problem with office computers. I should warn you, though, that some companies have a strict screensaver policy. Usually they allow only certain or no screensavers at all to be used on office computers.

If you are not sure how your company treats screensavers, I recommend you to consult your system administrator before applying any of the changes described below to your system.

So why can screensavers be inaccessible on your system?

As you know, Windows 2000 and Windows XP had many improvements over Windows 95/98 and Windows Me that made lives of many users easier and more comfortable.

But that's not all that made these operating systems so popular. Their developers also haven't forgotten about people who are responsible for administrative tasks when it comes to computers shared by different users and large computer networks.

Windows 2000 and Windows XP introduced a lot of new features needed specifically for their administration. Controlling/disabling screensavers was among them.

No matter whether it was their intention or an accident, your system administrator or the person who configured your PC could use this feature to your disadvantage. Now you'll have to use it once again and regain control over screensavers.

Here's what you should do:

  • Click Start and then click Run...

  • Type "gpedit.msc" and press Enter.

  • A window will open with a tree on its left. Expand the User Configuration node, then expand Control Panel and click Display.

  • Now look at the policies in the list to the right. Make sure that the policies starting from Hide Screen Saver Tab and ending with Screen Saver Timeout all have their state set to Not Configured.

  • If any of them has a different state, double click the line with the policy, select Not Configured and click OK.

  • Now close the Group Policy window.

    Now you can open Display Properties and see whether screensavers are back. If they aren't, step back and check if you carefully followed all the steps described above.

    Note that you can see a window saying you don't have permission to access Group Policy window when doing the step 2. That will happen if you are working under a restricted user account. You will have to log under an account with Administrator's rights or contact your system administrator.

    With a little creativity, you can use the information in this article to prevent your kids and other unauthorized users from messing with your screensavers. The procedure is basically the same. The only difference is that you should specify meaningful values for screensaver related items instead of Not Configured.

    About The Author

    Roman Kramar is a software developer who enjoys writing screensavers as his time permits. Visit his site at http://www.elasticsystems.com/ to find out more about screensavers and his work. http://www.elasticsystems.com/

    limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’Hare
    In The News:

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
    The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
    A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
    Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
    Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
    Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
    Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
    It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
    Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
    A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
    Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
    Melody, the artificial intelligence-powered robot, is life-sized and represents a move toward creating robots that resemble people in appearance and interaction.
    Here are five easy smartphone rules from the National Security Agency that you can follow to better protect your mobile device from hackers and scammers.
    A U.S. robotics company has developed "Jennie," a robotic pet powered by artificial intelligence that's designed to comfort those facing mental health challenges.
    Healthcare records for more than 184 million Americans were breached in 2024, but you can take steps to minimize that risk. Kurt the CyberGuy explains.
    The Skyrider X1 from Rictor claims to be the "first amphibious flying passenger motorcycle," and it combines land and air travel in one sleek design.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
    Home inventory and restoration apps help itemize and track every item in your home in the event you have to make an insurance claim after a natural disaster.
    The White House launched a new cybersecurity safety label, the U.S. Cyber Trust Mark, intended to help consumers make informed decisions on smart device safety.
    Today's tech can help make life so much easier — if you know how to use it. Here are a few tips on the quickest and best ways to make your phone, laptop and other devices work for you.
    Tech expert Kurt “CyberGuy" Knutsson offers Windows 11 restart fixes: Update drivers, run system scans and check hardware.
    Sony and Honda's Afeela 1 EV launches with advanced tech and entertainment for $89,900. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
    With limited hard drive space, tech expert Kurt “CyberGuy" Knutsson offers these tips for storing large video files and photos.
    Tech expert Kurt “CyberGuy" Knutsson says the $236,000 Yangwang U9 electric hypercar boasts 1,287 horsepower and can jump obstacles.
  • Lotus Domino: Reports and Connectors ? Crystal Reports, XML, ODBC/JDBC, OLE

    Lotus Notes Domino is very efficient in electronic document workflow... Read More

    Google Brings the Earth to Your Desktop

    Google Inc. has launched a new software package that allows... Read More

    Windows x: Basic Windows ?Security? Issues

    Language development computer: Computer-based method for aiding language development seems... Read More

    A Simple Guide To Wikis

    A wiki is an editable text-based website. But you don't... Read More

    Importance of Coding Standards

    Programming Help for BeginnersWe write programs to instruct computers. When... Read More

    COSMIC: A Small Improvement on the Symons Method

    The COSMIC FP (function point) software quality metric, is no... Read More

    HelpDesk & Asset Management Software - Choosing The Right One

    If you are to buy a HelpDesk & Asset Management... Read More

    The Truth: Netzero 3G

    We've all seen the ads on TV for Netzero 3G.... Read More

    Bridging the Gap between Paper and Data

    The cornerstone of successful automated office systems is the ability... Read More

    Demand More From Your Lead Tracking Software

    An integral part of any quality CRM system is lead... Read More

    Freight Forwarding ERP: Microsoft Business Solutions Great Plains customization & setup ? overview

    Microsoft Great Plains may be recommended for international freight forwarding... Read More

    Linux Secrets

    The first thing that you will notice about Linux Red... Read More

    Reduce Pop-ups and Annoying Ads

    There is many things more frustrating than surfing a website... Read More

    The Death of Windows

    I have always regretted how Microsoft price gouges and rips... Read More

    Microsoft Great Plains Food Processing ? Implementation & Customization Highlights

    Microsoft Great Plains might be considered as ERP platform to... Read More

    How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

    Fortunately one of the most common reasons cited for the... Read More

    Microsoft Great Plains - Microsoft RMS Integration ? overview

    Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More

    What is Spyware? Are You Being Watched?

    Find out why Spyware Removal from computers is important and... Read More

    DVD Burning Tips

    CD and DVD replication is a process that works by... Read More

    Microsoft Great Plains implementation: Restaurants Supply Chain Management Example

    Microsoft Great Plains serves majority of US based horizontal and... Read More

    Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

    All of us know that Microsoft bought former Great Plains... Read More

    Microsoft CRM Implementation & Remote Support

    We would like to give you pluses and minuses of... Read More

    Adware and Spyware Blockers

    The most important things you can do for your computer... Read More

    Microsoft Great Plains Implementation for Large Corporation ? Overview for VP IT

    Microsoft Business Solutions Great Plains was historically designed to serve... Read More

    Microsoft Great Plains Customization: Project Organization ? International Business Example

    Microsoft Business Solutions Great Plains fits to majority of horizontal... Read More

    taxi o'hare Auburn ..