maybe just feed the maggot or offer him a drink? Or give me a newspaper to read, or say, my computer is broken, and that's it, go outside on a scooter, go for a ride or sit in the sandbox. Or put him to bed right in the kitchen
I would set a password, then log in and set the auto-shutdown timer to run for 3 minutes, start the game for the child and exit. When a child would come running because his computer went out, I would pretend to be worried and accuse the child of breaking my computer and if something happens, his mother will have to compensate for the damage, and this * name a large amount * because there * expensive equipment, name which, using complex terms *. Mom herself will not be happy about this and will drive her child away from the computer.
For greater effect, you can insert an empty USB flash drive into your computer before all this, set automatic startup from a USB flash drive, but manually start it from a hard drive. And when the child's computer restarts, nothing will start. On a black background there will be an inscription something like "boot not found". You can poke buttons, reboot a couple of times, and then make a huge scandal, they say, YOU BROKEN MY COMP. And when it's over, switch autorun to the hard drive in the BIOS and continue using the computer)
Kirill, I greet you! Sorry that right away like this, but, judging by your questions, you are almost my grandchildren, not that you are suitable for sons, so let me be "on you" and "at home", tk. You are 13 years old now, as I understand it, and you correctly assume that if a computer can solve you for a long time, because a computer is provided to you by your parents or relatives, so to speak, for rent, it’s not yours, is it, Kiryush ?! Your question sounds like this with small cuts: "A neighbor with her son came to us. <...> her son was sent to me, <...> to play in the computer. How to secure a computer, <...> software?" For some reason, Kirill, nobody writes anything like that here, but, after all, you are actually putting everything in the wrong time! You prescribe everything in your question so that they have already come to you, the neighbor's son has already broken through to the computer, all that remains is to shrug (your) hands and wait for the consequences. Moreover, you do not even specify how old the son of this neighbor is! And then you yourself comment on the comments of others, they say, you have time to do everything in advance, and so on. Isn't that so, Kirill ?! So formulate everything, like, "For a computer after a short amount of time, if not today, then tomorrow a boy will most likely sit down ... years old, the son of a neighbor, play on it, what needs to be done to protect this computer from the actions of this boy, for example, software on a computer ?! " And in general - as I understand it, "they" (the rest) will be in the kitchen, and you are at the computer, since "they sent her son to me", right ?! So, Kiryusha, this is why it is important - how old the boy is to me personally to know here, and to others too - because if he is a preschooler, this is one thing, if he is already a teenager, this is something else. In the first case, most likely he will not be able to do anything with the computer at all, because he will only be able to press the arrows and play those games that you launch for him yourself, you will also teach him to play at the same time, that is, you will constantly close and keep everything "under control". And if the guy is already your age or older than you, then I would simply advise you to sit down and also play with him, and if he does not agree, probably wanting to play "online" on the Internet or just one, then, as it seems to me , no software will suffer either. The main principle here is simply to start the game that is interesting for him and make sure that he plays it. most often it will be a full-screen game. In general, if you are afraid, Kirill, that he will climb through the system folders, there, in Explorer, in the Start menu, he will try to delete something, then I again did not understand from your initial question: so where are you going what? In the kitchen, or something, next to mom, a neighbor, and so on, in a word, "them", the rest, as you put it ?! If "yes", then I think that you should just tell your mother or someone else from your relatives, they say, I would not want to leave the neighbor's son alone with our computer, because I'm afraid that he can do something with the computer out of inexperience, can I do it toowhere is it always there, in the room where the computer is ?! I think they will agree with you. And further! According to my observations, it is quite difficult to break today's computers, and the deleted software can be restored without loss, everything is on the distributions and it still takes additional time for this. You just really need to be close and (if anything!) Just turn off the power of the computer, yes, Kiryusha, and so it is drastic if you suspect that the boy - the neighbor's son is starting to do something wrong! And then straight to the adults, to the mother, for example, they say, everything, the games are over, I turned off the computer, they do not know how to handle it normally. I think that nothing will happen to you for such behavior, moreover, they will be praised - at least, they will definitely not be deprived of your computer, Kirill! And for the future - try to describe everything in your question as accurately as possible, so that then others here would not guess what, but how ?! Bye!
any software still needs to be installed and configured, so when it's already late to rush around.
But in general, I prefer to use a virtual machine for such cases, just back up and restore it completely, run it in fullscreen and so that he does not break there or on which sites which icons he does not press will not break anything for me (by the way, by the way, key genes only run from there what I wish you). of course, if the dude is bored and wants .. but for such only a look and the rights of a limited user.
Create an account without administrator rights in five minutes. This is if we talk about the information security of the computer, not physical integrity.)