If you are an intermediate user, it would be very interesting for you to know that all the user accounts can be controlled from command line (Known as dos command prompt).
There are some commands that help you understand about the user accounts, modify them or create new users.
These commands can be very helpful if used for right purposes, but someone with bad intentions can use it in a destructive way too. In here I just mention a few of these commands that are used more regularly.
If you are using windows VISTA to implement these commands you have to run command prompt with administrator privileges. (Right Click on the command prompt icon, and choose “Run as Administrator” from the menu)
We assume that your command prompt is open and you type the bold italic commands in the command prompt environment.
1. Net User : this command shows all the uses in the system.
2. Net User [username] : this command shows a specified users information such as “Local Group Memberships” and “Last logon”
3. Net Accounts : This command gives us information about the password age of the accounts
4. Net User [the username][new password] : This one is the fastest method to change password of any account the PC without knowing the Old Password for example you want to change the administrator password to pinokio you have to type like this: Net user administrator pinokio
5. Net User /add [new limited user] : This command helps you add a new user to the system; just remember that the new user will be a limited user. For example you like to add a user with the name “John” you should type like this: Net user John
6. Net localgroup Administrators [Username] /add : This command is one of the most interesting command in windows, it changes a limited account to administrator account.
7. Net user /Delete [username] : this command is the fastest way to delete a user!
There are many other commands related to user accounts and system security configuration, which can be very useful for those who have big networks with many computers or computers with different users each having different permission to access the computer resources. For example administrators of a network can create a “batch file” and use it for configuring users on a newly installed OS with just on click.