Can I allow someone else access to my favorites?

So far, I was only a laptop Vista Home Premium SP2 user, with 1 user (admin, password) account. I have now created a 2nd account, not administrator user and password-protected, for husband Dave. Both accounts have (ver.12) Firefox as default browser.

It will be the first foray of Dave using a computer and its main use of the laptop will be to find information on the web. I built a large collection of bookmarks in the last ten years (organized in folders, subfolders and so on), which would allow him to save some time. None of them are confidential. Is there a way I can enable access to them? And only when he wants to see them?

I have xmarks, but doubt that it would be useful here, because I do not want to merge bookmarks; I shall confine myself to Dave to be able to refer to mine when he wants (while having a blank canvas to build his own on).

The laptop is used almost exclusively at home and we have 2 are the only people living in the House; I think we could do without protection by password of user profiles most of the time, if it would help.

Fogmatic wrote:

I exported them as you suggested, and the HTML file does show the hierachies, but not as clearly as the folder view in Firefox.  There's quite a lot of scrolling down when bookmarks number about 2,000!

You must import the bookmarks in the HTML file, as I pointed out above.

Fogmatic wrote:

I've learned that Xmarks (which I use already) can probably do what I want

You said you didn't want to 'merge' bookmarks. If you want to actually synchronize bookmarks, then by all means use Xmarks or the built-in synchronization feature.

Tags: Firefox

Similar Questions

  • Can I allow someone else to add content to certain pages of the Web site?

    Hi, I'm new to Muse, downloaded as part of my creative cloud membership, watching the tutorials.

    I want to create a Web site for a National not-for-profit group and add the different Member States within the site.  I am able to allow people from different States to update their content on their pages?  It might be a pdf document or a photo?  Or can they add their own words.

    Any advice you can give me would be greatly appreciated thanks

    In the edition of browser gives you the option where admin users may modify the content (text and images).

    In the browser edition of Web sites using third-party providers of hosting services

    https://helpx.Adobe.com/Muse/how-to/Muse-in-browser-site-editing.html

    Thank you

    Sanjit

  • When I connect my Ipad or Iphone to my computer via a USB cable, I can open the storage folder without using a password. How can I avoid someone else do the same?

    When I connect my Ipad or Iphone to my computer via a USB cable, I can open the storage folder without using a password. How can I avoid someone else do the same?

    This storage folder are you referring? If you are referring to the film, what happens because you have accepted a trust between the iOS device and the computer. If the device has been connected to another computer, it must be unlocked and establish a relationship of trust as well. If you are referring to something different, please explain.

  • CAN I have firewall rule expcetion to allow someone to access block website

    Hi all

    Not sure I can do that on ISA570, any society is block the www.facebook.com but the boss want to access.

    We use content filtering to block the site, suggestions?

    This can be done through enforcement. Make a policy to block Facebook (for all IP addresses) and a policy to allow for Facebook (IP owner). In the mapping box chose policy boss first.

  • What is the best way to protect against keyloggers, monitoring tools, remote access, or whatever it is that allows someone else to access my laptop? ___

    History:

    Recently, I've had my laptop taken in charge and had to spend the money to have everything removed and reinstalled XP. I don't want it to happen again.

    Currently, I installed the following:

    • Ad-Aware
    • SUPERAntiSpyware
    • Malwarebytes Anti-Malware
    • Spybot - Search & destroy
    • Command AntiVirus
    • Sygate Personal Firewall

    The question:

    I'm still not convinced that I am protected. Most likely because I'm not.
    An Ad-Aware scan found a tool called "Win32.Monitor.SpyBuddy".
    a few days only after reinstalling XP. There are probably more.
    I don't know that he even went. It just says: its been "Quarantined" and there is no option to remove it.

    Basically, I just want to know that my computer is protected from keyloggers, monitoring, & people tools remote access to my laptop. And I don't want to spend more money.
    How to achieve this?  An answer would be GREATLY appreciated.

    Do not try to rationalize anything. Just tell you what I know and I hope that I will find the absolute best way to keep keyloggers, tools of surveillance, & virus off my laptop in the process.

    You have been very helpful and I thank you.

  • How do I prevent someone else access to content my wirelesss connection?

    original title: I have a wireless router and do not put a password and I think that someone manages to connect to my system at all times, how to get rid of this invader of fet?

    My children noticed that our computer becomes slow when they use the internet. I did check my network connection and find out there are two computers having access to my wireless router. I can always solve this or do I have to change my router and use 'password '?

    You must change your router password but also to put a password on your wireless router. Each PC will have to be amended to add the password. To learn more to do than to go to the web page of the manufacturer of your router.

  • How can I keep someone to access my data when they run a local SWF file system file

    I tried to look at cross area, but that seems to work only when a person runs from a network sandbox.

    If someone is running in a local with sandbox network, how can I keep their access to the data on my server. I want it accessible only by the swf file when it is run from my site?

    This might work.  I don't know a lot about technologies server side, but I thought that the HTTP request header has the applicant field so that your server cannot be denied, it is on this basis.  The local sandbox do crossdomain check but I think that your server which can detect in the header.

    Alex Harui

    Flex SDK Developer

    Adobe Systems Inc..

    Blog: http://blogs.adobe.com/aharui

  • How the hell can I prevent someone to access and use my paid on behalf of msn mail to send spam?

    I've already changed my password, but that someone is using my email address to send spam... help! I can't find a phone number for Microsoft anywhere.

    Send a message using any specific e-mail address, it's the best thing to do and something that cannot be stopped.  Just because your address is used to send the mail does not mean that your e-mail account is used.  If you have updated password of your account for something strong (see http://www.microsoft.com/en-gb/security/online-privacy/passwords-create.aspx) and updated all the security tools of the account, such as phone numbers cell and active account and security issues to always use HTTPS, then you have protected your account as it can be protected and it is probably not your account used to send the mail just your address.  Spammers who do it all the time.

  • How to restore the homescreen to allow someone else log on my computer.

    Whenever I try, that is the message that appears, "Services Client for Netware has disabled the Welcome screen and the fast user switching".

    I searched the Web for answers and reflected on my system for messages that I learned to watch for, but all without success.  I can't find any reference to this message on my system.  I have worked with computers and workstations in my professional life, but this problem is in my head and I don't like being beaten by a machine.

    If anyone can help.

    The advice here: http://xperiencexp.blogspot.com/2007/03/client-services-for-netware-has.html seems to indicate that it is an easy fix.

  • Can someone tell me how I can access the internet on my laptop to someone else's House?

    I want to take my computer on a visit, I can access the internet at home someone else with their supplier?

    Hi Huw,

    If it is a WIFI connection and they provide the access codes and Setup appropriate (and maybe even if they are not depending on how they are configured), it should be no problem.  You will probably need to create a new connection to connect to their network and possibly another new connection to connect to internet (if they are separated).  I created portable work of my wife to work from home in less than 5 minutes.

    If you need to connect with a cable, then you need a cable and they need a way to connect to their network or their internet connection or even a computer connected to the internet connection can be used by ICS to give you access (even once, after you have setup the proper connections and codes installation).

    The following may or may not be of help (although designed for Vista, you can get the general idea on their part and XP and W7will be similar and you should be able to work out the differences - if not, look how configure wireless internet access in "The BONES" of aid):

    Here is a tutorial on how to set up a home network (including a wireless)-click on additional links for more information that may be helpful: http://windows.microsoft.com/en-US/windows-vista/Setting-up-a-home-network.

    Here is an article on troubleshooting network connections wireless (with links): http://windows.microsoft.com/en-US/windows-vista/Troubleshoot-network-connection-problems.

    Here's a long guide on wireless internet connections in Vista: http://www.techwarelabs.com/guides/misc_mod/vistaconnection/.

    Here is an article on how to set up wireless internet in Vista: http://www.clpgh.org/usingthelibrary/technology/wireless/WindowsVista.pdf

    The truth is it is relatively easy and is done all the time by many people.  Think about all the people with laptops who take their origin and work at the same time and maybe even at Starbucks.

    I hope this helps.

    Good luck!

  • If someone else on the network as open thunderbird, nobody else can use it until the person origional closes their? Please tell us how to solve this problem.

    We use thunderbird on a network of several computers connected to an e-mail account. If someone else uses thunderbird as the sending and receiving of emails point on the other can use thunderbird at the same time until the first person close Thunderbird. How can we solve this problem?

    Do you know if your installation uses the IMAP protocol?

    Your problem may be due to the server; It can be configured to allow only a single connection at a time.

    Different users share a common profile? This would give the symptoms that you describe, since the Thunderbird locks his profile.

  • VNC access can be allowed safe?

    I recently came home and noticed that my iMac was doing something weird. It seemed that someone was remote control desktop and display something which relates to access to an account of the Wells Fargo Bank via a browser. I pulled the ethernet cable and rebooted the machine, and after a forced restart found that there was a kind of screen remote control application installed on my machine (I made no remarks and can't remember what they called the app) and my backup drive was locked up. Fortunately, the backup drive was only a matter of changing the permissions of the owner. I wiped the drive, reinstalled OS X (El Capitan), retrieved my data from a backup, and everything seems OK.

    I want to know is that there is a safe way to allow remote access to my computer or not. I still had ssh and vnc active and enabled for these services on my router, port forwarding so that I can access my machine remotely. I have no idea how my machine was robbed, but I guess it's to guess the vnc password. (The vnc password was also the admin password, which would explain how they managed to install the software). There are vnc on El Capitan vulnerabilities that allow a user access without password? Several times looking for different passwords an effective attack in this case? Allowing the two-factor authorization should take care of password guessing if this is the question.

    I would really like to be able to continue to access my machine remotely, but only if this can be done in a more secure manner. Thanks for useful tips on how this can be accomplished.

    Set up and use Back to My Mac - Apple Support

    For Apple ID - Apple Support two-factor authentication

  • Can someone else make my wireless connection network "secure"?

    Since the purchase of my laptop, I used a wireless internet network, the connection has always said he was an 'unsecured wireless network'. Last week he was playing so I went in the list of available networks and noticed she had changed to a "secure wireless network', I had never done that because I didn't know how to do it!

    It is possible that someone else has done? I called my service provider that I couldn't connect to internet at all and they were speaking to me in how to connect the ethernet cable to the computer and the modem. I don't know how to get my wireless connection, sorted, someone else had this problem or knows what to do?

    Thank you.

    First of all I must say that it s irresponsible to use the unsecured WiFi network!
    If the wireless network is not secure, everyone can get connected to the internet via your private internet access.

    Generally, each WLan router configuration mask is secure and you need a password to change the settings of the Wlan router.
    I put t know why you do not guarantee you Wlan because each Wlan router comes with the manual and configuration steps are described in all just way.

    If you n t know how to secure the Wlan router, ask a professional technician or first check the manual of the router.

  • How can you tell if someone else is having your email charged to their account in respect of the audit of the other e-mail options?

    for example, if someone knows my password and they choose to download my mail on their behalf.  is there a notification sent to me that tells me that?  And if I change my password, they can always get access or you have to enter the password associated with this account each time you check them?  clear as mud?

    Hello

    This forum is for comments on the Forums for answers then you really should ask
    in the Forums for answers corresponding to your version of Windows.

    Answers - Forums
    http://answers.Microsoft.com/en-us/Windows

    -------------------------------------------------------------------------------------------------

    Normally you would not get a notice if someone has access to your email.

    If you change the password must to lock anyone out of your e-mail, unless
    you have defined it for download on your computer automatically by using an e-mail program.
    If you need to go online or have any e-mail program set to request your password
    the email must be secure. Don't forget to put online do not save your login or
    remove the cookies. Also, your login information can be saved if you set IE AutoComplete
    and tell him to remember your name and your password.

    ----------------------------------------------------------------------------------------------------------------------

    If you suspect that your account has been hacked or spoofed they should contribute.

    Proceed to a very thorough check for malware and then change your password by e-mail.

    It is possible for a person to send the email that 'seems' to be of your
    account but that is not really - called "Spoofing." That means its 'Possible' emails
    were not really you, although they may have your contact list. Have someone
    who receives the e-mails to check the header to see where he is actually sent by and
    NOT only the answer to the address.

    How to read the message headers
    http://www.high-speed-Internet-Access-Guide.com/articles/email-headers.html

    E-mail spoofing
    http://en.Wikipedia.org/wiki/E-mail_spoofing

    E-mail spoofing and Phishing
    http://www.mailsbroadcast.com/email.broadcast.FAQ/46.email.spoofing.htm

    Understanding E-mail Spoofing
    http://www.windowsecurity.com/articles/email-spoofing.html

    Fraudulent emails (false)
    http://pages.eBay.com/education/spooftutorial/

    Google search - email Spoofing
    http://www.Google.com/search?hl=en&EI=FB1nS9DiNo7CsQPNhKGdAw&SA=X&Oi=spell&resnum=0&CT=result&CD=1&ved=0CAgQBSgA&q=email+spoofing&spell=1

    =============================================

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    New Vista and Windows 7 version
    http://OneCare.live.com/site/en-us/Center/whatsnew.htm

    Original version
    http://OneCare.live.com/site/en-us/default.htm

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

  • Someone else can run on the computer that I use.

    Someone else can run on the computer that I use.

    Your comments 'tolérable Sun' and 'easy assistance' are not understandable, could you please clarify?  If you are worried about someone on the Internet access to your PC, you must have the software firewall (Windows Firewall) and equipment (router).  This combined with the password will be the bulletproof 99% of your machine.

Maybe you are looking for