55.4 Resetting Passwords
If you can’t log in to a MW/Windows computer because you have lost/forgotten your password, then use Live Linux CD and the chntpw application. This should work for all NT-based version of Windows (Windows 2000 and later, including Windows 7).
Note that encrypted files on the MW/Windows hard disk encrypted (using the built-in Windows encryption) may not be available after changing the Windows password as we describe here.
Boot your computer from the System Rescue CD (<sourceforge.net/projects/systemrescuecd/> to obtain a command line.
Mount the MS/Windows disk. It might be /dev/sda1 or /dev/sda2.
$ ntfs-3g /dev/sda1 /mnt/windows $ ls /mnt/windows
We should see in the directory listing a WINDOWS folder, and under that a system32 folder. If not, then it might be the wrong partition. So try /dev/sda2.
$ cd WINDOWS/system32/config/
The file SAM contains the Windows registry, which includes the passwords.
To list the users we can use the command:
$ chntpw -l SAM
To change or reset the administrator password, enter:
$ sudo chntpw SAM
Some text will appear and we will see a list of all of the users of the system.
User Edit Menu:'' prompt at the bottom of the terminal window choose to clear the password to blank. We can always set a new password in Windows once you log in. To do this, enter1’’ and then
``y’’ to confirm.
To reset or change the password of a user other than the administrator, enter:
$ sudo chntpw -u <username> SAM
Then reboot into MS/Windows.
Your donation will support ongoing availability and give you access to the PDF version of this book. Desktop Survival Guides include Data Science, GNU/Linux, and MLHub. Books available on Amazon include Data Mining with Rattle and Essentials of Data Science. Popular open source software includes rattle, wajig, and mlhub. Hosted by Togaware, a pioneer of free and open source software since 1984. Copyright © 1995-2021 Graham.Williams@togaware.com Creative Commons Attribution-ShareAlike 4.0