What to Do if All Screensavers Fun is Grayed Out?

Finally, you have some time to personalize your desktop with an interesting screensaver. But wait... What's that? Why in the world the system prevents you from doing that? The screensaver controls are grayed out or, even worse, the whole Screensaver tab is missing from Display Properties. Don't panic! This article will help you change things for the better.

I've found that people who use Windows 2000/XP often can't enjoy screensavers because their system is configured in a way that prevents them from doing that.

Unless you are very experienced in administrating Windows, you may stuck with the problem. If you ever found yourself or your friend in a situation like this, add this article to your arsenal of screensaver tips.

Most of the time people encounter the problem with office computers. I should warn you, though, that some companies have a strict screensaver policy. Usually they allow only certain or no screensavers at all to be used on office computers.

If you are not sure how your company treats screensavers, I recommend you to consult your system administrator before applying any of the changes described below to your system.

So why can screensavers be inaccessible on your system?

As you know, Windows 2000 and Windows XP had many improvements over Windows 95/98 and Windows Me that made lives of many users easier and more comfortable.

But that's not all that made these operating systems so popular. Their developers also haven't forgotten about people who are responsible for administrative tasks when it comes to computers shared by different users and large computer networks.

Windows 2000 and Windows XP introduced a lot of new features needed specifically for their administration. Controlling/disabling screensavers was among them.

No matter whether it was their intention or an accident, your system administrator or the person who configured your PC could use this feature to your disadvantage. Now you'll have to use it once again and regain control over screensavers.

Here's what you should do:

  • Click Start and then click Run...

  • Type "gpedit.msc" and press Enter.

  • A window will open with a tree on its left. Expand the User Configuration node, then expand Control Panel and click Display.

  • Now look at the policies in the list to the right. Make sure that the policies starting from Hide Screen Saver Tab and ending with Screen Saver Timeout all have their state set to Not Configured.

  • If any of them has a different state, double click the line with the policy, select Not Configured and click OK.

  • Now close the Group Policy window.

    Now you can open Display Properties and see whether screensavers are back. If they aren't, step back and check if you carefully followed all the steps described above.

    Note that you can see a window saying you don't have permission to access Group Policy window when doing the step 2. That will happen if you are working under a restricted user account. You will have to log under an account with Administrator's rights or contact your system administrator.

    With a little creativity, you can use the information in this article to prevent your kids and other unauthorized users from messing with your screensavers. The procedure is basically the same. The only difference is that you should specify meaningful values for screensaver related items instead of Not Configured.

    About The Author

    Roman Kramar is a software developer who enjoys writing screensavers as his time permits. Visit his site at http://www.elasticsystems.com/ to find out more about screensavers and his work. http://www.elasticsystems.com/

    express cleaning service Arlington Heights ..
    In The News:

    Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
    Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
    Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
    Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
    Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
    Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
    Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
    Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
    Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
    New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
    A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
    AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
    A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
    New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
    Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
    Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
  • Helping Newbies Understand Professional Software

    The Windows registry is a huge database that ensures normal... Read More

    Data Quality Best Practices for Salesforce.com

    Executive SummaryAn effective plan for entering, cleaning and updating the... Read More

    Resume Software ? Advantages Revealed

    The various resume software offered, particularly on the internet, can... Read More

    Not All Project Management Software is Created Equal

    The purpose of Project Management Software is to provide an... Read More

    Performance Tuning of a Daffodil DB / One$DB -JDBC Application

    This article illustrates the best practices to improve the performance... Read More

    EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

    Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

    Know Linux

    Linux essentials:It's free for download but you have to pay... Read More

    Software Upgrades Arent Always the Best Move

    When my daughter was getting into AOL instant messaging (AIM)... Read More

    Separate Anti-Keylogging Protection: Who Needs it Most?

    If there still are few unprotected computers left, I haven't... Read More

    Three Steps To Windows Safety Heaven

    Now there are Three Steps To Heaven Just listen and... Read More

    Oracle Development: JDeveloper 10G ? Java, J2EE, EJB, MVC, XML - Overview For Programmer

    In 2004 Oracle, Inc. made its new step toward J2EE... Read More

    A Simple Guide To Wikis

    A wiki is an editable text-based website. But you don't... Read More

    Microsoft Great Plains Partner Selection: Overview

    Microsoft Great Plains, Navision, Solomon and Axapta are Microsoft Business... Read More

    Microsoft CRM and No-Frills Cadillacs

    In today's business world it's all but impossible to escape... Read More

    Google Brings the Earth to Your Desktop

    Google Inc. has launched a new software package that allows... Read More

    C++ Tutorial 1, Introduction to C++

    Introduction to C++Why Learn C++?C++ may at first seem like... Read More

    Selecting Microsoft Great Plains Partner/VAR/Reseller: ERP Implementation & Customization ? Overview

    In the case when you represent mid-size or mid-size-to-large business,... Read More

    Professional Software Icons For Your Standalone Application

    User interfaces and accessibility are some of the most important... Read More

    Microsoft CRM or Siebel

    Siebel is traditional CRM market leader, however and mostly due... Read More

    Software Piracy - Global Increase

    Pirated software is on the increase and now accounts for... Read More

    A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications

    Icons are used everywhere; right from software applications, to internet... Read More

    Microsoft RMS Customization ? PO Items Receiving in Great Plains

    Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

    Tripwire for Linux File Integrity

    What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More

    Need of Document Management System (DMS)

    Document Management or Enterprise Information Management is perhaps one of... Read More

    Navision Sales Module & Reporting: Jet Reports, C/ODBC, XBRL, Business Analytics ? highlights

    Microsoft bought Navision, Denmark based software development company, along with... Read More

    tidy up service Arlington Heights ..