A technique is disclosed for protecting a computer system. In one embodiment, the technique comprises configuring a first account with a first privilege and configuring a second account with a second privilege, wherein the first account is restricted at a configured time.