Abstract: A computer-implemented method for providing a plurality of security schemes and allowing a particular user of a computer system from among a plurality of users of the computer system to select a security scheme to be associated with the user independent of the security scheme selected by a remainder of the plurality of users of the computer system, thereby providing user customizable security to the computer system. At least one of the security schemes is comparatively more secure than another. Selections of security schemes are included with account information of the particular user and are used in connection with authorizing the particular user to use the computer system. First and second users can each select different security schemes based on their personal preferred balance between convenience and security and have their respective access to the computer system managed in relation to the selections included with their respective accounts.
Abstract: Publishing content in a web-viewable format to make the content accessible over a network to one or more requestors at respective computers includes responding to a print operation initiated by a program in regard to the content to be published, the print operation being directed by a virtual printer driver to a system having one or more microprocessors. Using code executing in the or more microprocessors, content is received from the program, which can be independent of the system, the content is converted into a web viewable format, and the converted content is stored in a storage area. The converted content is thereafter made accessible for viewing in the web-viewable format to the one or more requestors at respective computers over the network. In further aspects, the storage area can comprise a third-party storage area for which authentication need be provided to allow storage of the content.