Quick Recovery Windows XP Administrator Password Three Tips

  


Tip 1: Delete SAM File to Recover Password
We all know that Windows XP password is stored in the SAM file under WindowsSystem32Config where the system is located, SAM file is Account password database file. When we log in to the system, the system will automatically collate with the SAM in Config. When the password and username are found to match the encrypted data in the SAM file, you can log in successfully; if it is wrong, you cannot log in. In this case, we can recover the password by deleting the SAM file.
If you have two operating systems installed, you can use another operating system that can access NTFS to boot your computer. If you do not have two operating systems installed, you can use other tools to access NTFS, then delete the SAM file in the C:Windowssystem32config directory (as shown) and restart the operating system. At this time, the administrator Administrator account has no password. Of course, it is also a good idea to remove the hard drive and switch to another machine to delete the SAM file.
Tip: The security management of user accounts in Windows NT/2000/XP uses the security account manager (SAM) mechanism. The security account manager manages accounts by security identification. It is created at the same time when the account is created. Once the account is deleted, the security ID is also deleted. The security identity is unique, and even with the same username, the security identity obtained each time it is created is completely different. Therefore, once an account is deleted, its security identity no longer exists. Rebuilding the account with the same username will also be assigned a different security identity and will not retain the original permissions.
The specific performance of the Security Account Manager is the %SystemRoot%system32configsam file. The SAM file is the user account database of Windows NT/2000/XP, and all the user's login name and password and other related information will be saved in this file.
Tip 2: Use the tool software to recover your password
Use the Off1ine NT Password&&Registry Editor. Use this tool software to make a Linux boot disk. This boot disk can access the NTFS file system, so it can support Windows 2000/XP very well. Using one of the floppy disks, Ntpasswd, which runs on Linux, solves the problem and can read the registry and rewrite the account password. The method used is very simple, just follow the prompts after startup to do it step by step. Here, it is recommended that you use the quick mode, which will list the user's password for the user to choose to modify. By default, the user of the Admin group is automatically found to replace the Administrator's name. This is very convenient.
Tip 3: Use NTFS DOS to recover passwords
Use NTFS DOS This tool can write NTFS partitions from DOS, use this tool to make a DOS boot disk, and then go to C:WindowsSystem32 to save the screen saver. Logon.scr renamed, then copy command.com to C: Windowssystem32, and rename the file to logon.scr. After waiting for 5 minutes to start the machine, the screen saver that should have appeared now becomes the command line mode, and has the Administrator privilege, through which you can change the password or add a new administrator account. Don't forget to change the name of the screen saver back after the change.

Copyright © Windows knowledge All Rights Reserved