Tip 1: Delete SAM files to recover passwords. Everyone knows that Windows XP passwords are stored in the SAM file under Windows System32Config where the system is located. The SAM file is the account password database file. When we log in to the system, the system will automatically collate with the SAM in Config. When the password and username are found to match the encrypted data in the SAM file, you can log in successfully; if it is wrong, you cannot log in. In this case, we can recover the password by deleting the SAM file.
If you have two operating systems installed, you can use another operating system that can access NTFS to boot your computer. If you do not have two operating systems installed, you can use other tools to access NTFS, then delete the SAM file in the C:Windowssystem32config directory (as shown) and restart the operating system. At this time, the administrator Administrator account has no password. Of course, it is also a good idea to remove the hard drive and switch to another machine to delete the SAM file.
Tip: The security management of user accounts in Windows NT/2000/XP uses the security account manager (SAM) mechanism. The security account manager manages accounts by security identification. It is created at the same time when the account is created. Once the account is deleted, the security ID is also deleted. The security identity is unique, and even with the same username, the security identity obtained each time it is created is completely different. Therefore, once an account is deleted, its security identity no longer exists. Rebuilding the account with the same username will also be assigned a different security identity and will not retain the original permissions.
The specific performance of the Security Account Manager is the %SystemRoot%system32configsam file. The SAM file is the user account database of Windows NT/2000/XP, and all the user's login name and password and other related information will be saved in this file.
Tip 2: Use the tool software to recover the password
Use Off1ine NT PassWord&&Registry Editor. Use this tool to make a Linux boot disk. This boot disk can access the NTFS file system, so it works well. Support for Windows 2000/XP. Using one of the floppy disks, Ntpasswd, which runs on Linux, solves the problem and can read the registry and rewrite the account password. The method used is very simple, just follow the prompts after startup to do it step by step. Here, it is recommended that you use the quick mode, which will list the user's password for the user to choose to modify. By default, the user of the Admin group is automatically found to replace the Administrator's name. This is very convenient.
Tip 3: Use NTFS DOS to recover passwords
Use NTFS DOS This tool can write NTFS partitions from DOS, use this tool to make a DOS boot disk, and then go to C:WindowsSystem32 to save the screen saver. Logon.scr renamed, then copy command.com to C: Windowssystem32, and rename the file to logon.scr. Wait 5 minutes after starting the machine, the screen saver that should appear now becomes the command line mode, and has Administrator permission, through which you can change your password or add a new administrator account. Don't forget to change the name of the screen saver back after the change.