Restricting a device is intended for other control rather than self control, and is similar to traditional parental controls. If you’re seeking “password protection”, this is the page for you.

The child need not and probably should not have an account on https://u.pluckeye.net/.

See also: family

Overview

Plucky is most often used in self-control mode. But some users, especially some parents, would prefer “other-control” mode, meaning a person other than the primary computer user has control over the configuration of Plucky. That’s what a restricted device is for.

How to set it up

Imagine Edmund has found the self-control mode has not worked well, and both he and Susan think life would be better if she were in charge of Edmund’s Plucky configuration. Here’s how they do it.

  1. Susan installs Plucky on Edmund’s computer if it isn’t already installed.

  2. Susan creates an account for herself on https://u.pluckeye.net/.

  3. If Edmund already has an account on https://u.pluckeye.net/, he must visit his device’s webpage and click the liberate button to relinquish control of his device.

  4. Susan then logs on to https://u.pluckeye.net/ as Susan using Edmund’s computer. The website informs Susan that she now owns Edmund’s device.

  5. Susan navigates to the webpage for the device by clicking on her name in the upper right hand corner of the page, selecting profile, and on her profile page, clicking on the computer name.

  6. Susan creates a new general configuration for Edmund’s device.

  7. Susan configures the new configuration. She decides to import the classic and the no programs configurations to start. She also enables the system feature in the main configuration by typing:

    feature:system
    

    in the edit tab of the configuration.

  8. Susan clicks the red “restrict” button.

  9. Susan runs this command on the computer in a console window:

    pluck sync
    
  10. Susan restarts the computer.

After performing the above steps, the allow and block buttons will not change the device configuration. Instead they will submit suggestions that Susan may approve or reject. Susan can now configure Edmund’s device by simply logging into the users site from any computer she likes.

Alternatives

An alternative to a restricted device is to set a long delay on the device, say 7 days, and to then rely on the approver and inspector system to help Edmund stay on track.