Deepin 2014 guest

Deepin 2014 ships with a guest user account, but you’ll need to enable it before you can use it. It took me a while before I figured out how to use it.

This short tutorial shows how to enable and use it, if you are still trying to figure it out yourself.

It’s a simple, 4-step process: 1. Log in with an account with administrative privileges; 2. Enable the guest account; 3. Log out; 4. Log in as a guest user.

Related Post:  How to layout and design an infographic in R

That’s the text version. Here follows a version with screenshots.

1. You are already logged into the system as a user with administrative privileges. So open the Control Center and click on the User Accounts module. Click on the Guest account tab.
Deepin 2014 user accounts

Related Post:  How to customize Linux Deepin 12.12

Enable the guest account.
Deepin 2014 enable guest user

Click on the Power module and log out.
Deepin 2014 log out

On the login screen, click on the user icon next to the power icon.
Deepin 2014 login screen

Click on the Guest user icon.
Deepin 2014 login accounts

Log in.
Deepin 2014 guest account

You may now use Deepin 2014 as a guest user.
Deepin 2014 guest

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

5 Responses

  1. I got stock at the “cmake .” I get “bash: cmake: command not found…”
    Please help don’t know how to proceed further. Never compiled a file before.

    Thanks

  2. That last command (yum install hotshots) doesn’t work, which is logical. How would you suggest to install a non-rpm program using yum?

    1. Eagle-eyed reader, thank you. That last command was not even necessary. And considering that I have the thing installed on the computer I’m using right now, I wonder why I made the decision to tack yum install on there.

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.