Windows XP administrator password three tips

  

Tip 1: delete the SAM file to recover the password

We all know that the WindowsXP password is stored in the SAM file under the WindowsSystem32Config system, the SAM file is the account password database file. When we log in to the system, the system will automatically collate with the SAM in Config. When the password and username are found to match the encrypted data in the SAM file, you can log in successfully; if it is wrong, you cannot log in. In this case, we can recover the password by deleting the SAM file.

If you have two operating systems installed, you can use another operating system that can access NTFS to boot your computer. If you do not have two operating systems installed, you can use other tools to access NTFS, then delete the SAM file in the C:Windowssystem32config directory (as shown) and restart the operating system. At this time, the administrator Administrator account has no password. Of course, it is also a good idea to remove the hard drive and switch to another machine to delete the SAM file.

Tip: Windows NT/2000/XP uses the security account manager (SecurityAccountManager, SAM) mechanism for security management of user accounts. The security account manager manages accounts by security identification. The logo is created at the same time as the account is created. Once the account is deleted, the security logo is also deleted. The security identity is unique, and even with the same username, the security identity obtained each time it is created is completely different. Therefore, once an account is deleted, its security identity no longer exists. Rebuilding the account with the same username will also be assigned a different security identity and will not retain the original permissions.

The specific performance of the Security Account Manager is the %SystemRoot%system32configsam file. The SAM file is the user account database of Windows NT/2000/XP, and all the user's login name and password and other related information sections are saved in this file.

Tip 2: Use the tool software to recover your password

Use Off1ine NTPassWord&&RegistryEditor. Use this tool to make a Linux boot disk. This boot disk can access the NTFS file system, so it can support Windows2000/XP very well. Using one of the floppy disks, Ntpasswd, which runs on Linux, solves the problem and can read the registry and rewrite the account password. The method used is very simple, just follow the prompts after startup to do it step by step. Here, it is recommended that you use the quick mode, which will list the user's password for the user to choose to modify. By default, the user of the Admin group is automatically found to replace the Administrator's name. This is very convenient.

Tip 3: Use NTFS Dos to recover passwords

Use NTFSDOS, a tool that can write NTFS partitions from DOS, use this tool to make a DOS boot disk, and then go to C:WindowsSystem32 Rename the screen saver logon.scr, then copy command.com to C:Windowssystem32 and rename the file to logon.scr. After waiting for 5 minutes to start the machine, the screen saver that should have appeared now becomes the command line mode, and has the Administrator privilege, through which you can change the password or add a new administrator account. Don't forget to change the name of the screen saver back after the change.

Copyright © Windows knowledge All Rights Reserved