Zainstaluj Steam
zaloguj się
|
język
简体中文 (chiński uproszczony)
繁體中文 (chiński tradycyjny)
日本語 (japoński)
한국어 (koreański)
ไทย (tajski)
български (bułgarski)
Čeština (czeski)
Dansk (duński)
Deutsch (niemiecki)
English (angielski)
Español – España (hiszpański)
Español – Latinoamérica (hiszpański latynoamerykański)
Ελληνικά (grecki)
Français (francuski)
Italiano (włoski)
Bahasa Indonesia (indonezyjski)
Magyar (węgierski)
Nederlands (niderlandzki)
Norsk (norweski)
Português (portugalski – Portugalia)
Português – Brasil (portugalski brazylijski)
Română (rumuński)
Русский (rosyjski)
Suomi (fiński)
Svenska (szwedzki)
Türkçe (turecki)
Tiếng Việt (wietnamski)
Українська (ukraiński)
Zgłoś problem z tłumaczeniem
Well... yeah physical access to the machine and unlimited time probably makes that possible.
Back when my father in law passed, the wife wanted access to his machines, so I used some MS provided tools to reset passwords on Windows 7. The password was there to prevent casual access, not to turn the machine into a brick in all possible circumstances. So if that's what you want to do, it's your job to manage your security as such. Relying solely on a local password and making poor decisions and assumptions that it be unbreakable may not be reasonable or informed.
And who is stealing your laptop in your fantasy? Regular thieves who are going to turn around and sell it, maybe just wipe the drive? In which, who cares.
Or are the thieves stealing it specifically to access your data? In which case secure your devices and add additional security to encrypt the drive and protect the data and go as far as you see fit. Sky's the limit. It's your machine, you administrate it for crying out loud.
You're freaking out like you expect the lock on your front door to stop a tank. "Oh no, your house isn't secure!"
I dont know that YT clip as I dont use YT, but yeah, there is an explicit hack to do this in less than 5 minutes for Windows 10 and Windows 11 .. and if you create a simple batch or command script which isnt even longer than 10 lines, you do and achieve this by a single "click" only ..
If you are smart, you can setup something which conceal that password bypass and reset and to restore that hacked file of course ..
That is why using a TPM 2.0 module is neccessary to set up a PIN, even for local accounts, which may be shorter and less complex than a regular password, but it is a PIN which cannot be hacked and reset .. encrypted and decrypted within the TPM 2.0 hardware chip. However, this particular W10/W11 hack will also bypass TPM's PIN screen .. so ..
I wonder why this "backdoor" hasnt been sealed yet ..
Yet maybe that is why Microsoft is hardly trying to force up online accounts on us .. but if your data are still locally stored, even that wont help ..
P.s.:
Additionally I need to say it was even easier to bypass and reset a password for Windows 7 and earlier by a different "feature" with official built-in Microsoft Tools .. but with a same conceal/veil/cover up .. all done in less than 2 minutes ..
The best and quickest hacks are still done locally on a machine ..
And if your drives are NOT encrypted, an easy Linux LiveCD is capable to catch all data anyways .. which reveals even more data on a machine as Linux has more precise tools ..
No any Passwords needed at all .. !! It is ridiculous, isnt it .. ?!
If you wanna be cleared, dont store any critical files locally.. do backups on a small SSD/USB and hide it, encrypted, I even recommend a HDD to store files.. or store it on a server .. as servers usually have precise firewalls, SSL/TLS and other various encrypted security certificates and tools also for handshakes etc ..
Hacker so then need to gain either access to that server, locally, or to gain access to that server through a "terminal" / work station via "leaked" passwords, databases, phishing .. and/or especially through an insiders job via corruption, as this is still a common general case ..
There was just revealed an "insiders job"[www.yahoo.com] in Germany, stolen (military) data and tech for China .. China is missing Laser Technologies for warfare .. as to globally re-establish and to re-gain their military power and world power .. to be ontop with the USA ..
Like that:
US Navy Helios Laser trillion USD tech
LOCKHEED MARTIN HAS DELIVERED 'HELIOS' TO THE U.S NAVY - HAS TWICE THE POWER OF PREVIOUS VARIANT !
Well .. you get that idea .. Good Luck !
If you are worried about this scenario in particular then what you really want to do is use TPM + Secure Boot + BitLocker + an Online Account for your WinOS. You do not have to use a Microsoft account though, you can use GMail or something like that if you want. Just ensure that you never get locked out of that email account and that it never gets deleted.
Another suggestion would be to apply a BIOS Boot Password as well.
Then configure the BIOS to only ever boot to the internal SSD.
This way if your Laptop gets stolen and they just toss out your OS Drive, they still can't make use of the system because of the BIOS Password and also would not be able to boot from USB; etc. without entering the BIOS, entering the password so they can make changes. It's not 100% fail-safe but for many folks, they would have a very hard time getting around all of this that I just explained.
Also someone requires the skills to actually do this, which very few people do.
Ryzen pro and Intel Xeon for sure they have.