%a 23 kwietnia 2024 o 14:28
Windows 11 local account password
Hey so i just bought a new laptop with w11/home made a local account and put a password. just a question apparently on YouTube you can bypass the password and reset it? is this true? because having a password is clearly not secured.
< >
Wyświetlanie 1-15 z 31 komentarzy
Omega 23 kwietnia 2024 o 14:51 
Just reinstall the OS.
%a 23 kwietnia 2024 o 14:56 
no im saying if i set a password, and if the laptop got stolen CAN someone get into my windows and view my files.
Omega 23 kwietnia 2024 o 15:00 
Początkowo opublikowane przez %a:
no im saying if i set a password, and if the laptop got stolen CAN someone get into my windows and view my files.
Yes, they can simply pull out the drive and pull all files from it using another machine, unless you enable Bitlocker or some other form of disk encryption. Bitlocker is only available for the Pro versions of Windows.
Ostatnio edytowany przez: Omega; 23 kwietnia 2024 o 15:01
nullable 23 kwietnia 2024 o 15:09 
Początkowo opublikowane przez %a:
no im saying if i set a password, and if the laptop got stolen CAN someone get into my windows and view my files.

Well... yeah physical access to the machine and unlimited time probably makes that possible.

Back when my father in law passed, the wife wanted access to his machines, so I used some MS provided tools to reset passwords on Windows 7. The password was there to prevent casual access, not to turn the machine into a brick in all possible circumstances. So if that's what you want to do, it's your job to manage your security as such. Relying solely on a local password and making poor decisions and assumptions that it be unbreakable may not be reasonable or informed.

And who is stealing your laptop in your fantasy? Regular thieves who are going to turn around and sell it, maybe just wipe the drive? In which, who cares.

Or are the thieves stealing it specifically to access your data? In which case secure your devices and add additional security to encrypt the drive and protect the data and go as far as you see fit. Sky's the limit. It's your machine, you administrate it for crying out loud.

You're freaking out like you expect the lock on your front door to stop a tank. "Oh no, your house isn't secure!"
Ostatnio edytowany przez: nullable; 23 kwietnia 2024 o 15:10
%a 23 kwietnia 2024 o 15:14 
lol im just saying as a example.. was just curious with setting a password my a local account.
N3tRunn3r 23 kwietnia 2024 o 16:25 
Początkowo opublikowane przez %a:
.. just a question .. you can bypass the password and reset it? is this true? because having a password is clearly not secured.

I dont know that YT clip as I dont use YT, but yeah, there is an explicit hack to do this in less than 5 minutes for Windows 10 and Windows 11 .. and if you create a simple batch or command script which isnt even longer than 10 lines, you do and achieve this by a single "click" only ..

If you are smart, you can setup something which conceal that password bypass and reset and to restore that hacked file of course ..

That is why using a TPM 2.0 module is neccessary to set up a PIN, even for local accounts, which may be shorter and less complex than a regular password, but it is a PIN which cannot be hacked and reset .. encrypted and decrypted within the TPM 2.0 hardware chip. However, this particular W10/W11 hack will also bypass TPM's PIN screen .. so ..

I wonder why this "backdoor" hasnt been sealed yet ..

Yet maybe that is why Microsoft is hardly trying to force up online accounts on us .. but if your data are still locally stored, even that wont help ..

P.s.:
Additionally I need to say it was even easier to bypass and reset a password for Windows 7 and earlier by a different "feature" with official built-in Microsoft Tools .. but with a same conceal/veil/cover up .. all done in less than 2 minutes ..

The best and quickest hacks are still done locally on a machine ..

And if your drives are NOT encrypted, an easy Linux LiveCD is capable to catch all data anyways .. which reveals even more data on a machine as Linux has more precise tools ..
No any Passwords needed at all .. !! It is ridiculous, isnt it .. ?!

If you wanna be cleared, dont store any critical files locally.. do backups on a small SSD/USB and hide it, encrypted, I even recommend a HDD to store files.. or store it on a server .. as servers usually have precise firewalls, SSL/TLS and other various encrypted security certificates and tools also for handshakes etc ..

Hacker so then need to gain either access to that server, locally, or to gain access to that server through a "terminal" / work station via "leaked" passwords, databases, phishing .. and/or especially through an insiders job via corruption, as this is still a common general case ..

There was just revealed an "insiders job"[www.yahoo.com] in Germany, stolen (military) data and tech for China .. China is missing Laser Technologies for warfare .. as to globally re-establish and to re-gain their military power and world power .. to be ontop with the USA ..

Like that:
US Navy Helios Laser trillion USD tech

LOCKHEED MARTIN HAS DELIVERED 'HELIOS' TO THE U.S NAVY - HAS TWICE THE POWER OF PREVIOUS VARIANT !

Well .. you get that idea .. Good Luck !

:cwat:
Ostatnio edytowany przez: N3tRunn3r; 23 kwietnia 2024 o 18:00
Bad 💀 Motha 23 kwietnia 2024 o 18:20 
Początkowo opublikowane przez %a:
no im saying if i set a password, and if the laptop got stolen CAN someone get into my windows and view my files.

If you are worried about this scenario in particular then what you really want to do is use TPM + Secure Boot + BitLocker + an Online Account for your WinOS. You do not have to use a Microsoft account though, you can use GMail or something like that if you want. Just ensure that you never get locked out of that email account and that it never gets deleted.

Another suggestion would be to apply a BIOS Boot Password as well.
Then configure the BIOS to only ever boot to the internal SSD.
This way if your Laptop gets stolen and they just toss out your OS Drive, they still can't make use of the system because of the BIOS Password and also would not be able to boot from USB; etc. without entering the BIOS, entering the password so they can make changes. It's not 100% fail-safe but for many folks, they would have a very hard time getting around all of this that I just explained.
Ostatnio edytowany przez: Bad 💀 Motha; 23 kwietnia 2024 o 18:24
yes if i or most anyone get access to your pc, to remove a password is easy.. i have done it many times.. as Bad motha said if you have tpm, secure boot, and bitlocker it makes it harder.. security is about layers.. but with physical access and time . crack..
Ostatnio edytowany przez: Ð₳Ɽ₭★𐌔Ŧ₳Ɽ; 24 kwietnia 2024 o 5:44
Pocahawtness 24 kwietnia 2024 o 10:04 
I have never looked in to it, but I would think the only way forward is to use an encrypted drive.
A&A 24 kwietnia 2024 o 10:05 
Even if you use bitlocker with TPM, the module itself is a flaw in the system, because it stores the decryption keys and has a direct connection to the processor, where with prepared equipment you will be able to read the signals. And they are cheap.
Ostatnio edytowany przez: A&A; 24 kwietnia 2024 o 10:25
Omega 24 kwietnia 2024 o 10:18 
Początkowo opublikowane przez A&A:
Even if you use bitlocker with TPM, the module itself is a flaw in the system, because it stores the decryption keys and has a direct connection to the processor, where with prepared equipment you will be able to read the signals. And they are cheap.
Only affects systems with a separate TPM module, most systems today use a vTPM build in to the CPU itself.

Also someone requires the skills to actually do this, which very few people do.
A&A 24 kwietnia 2024 o 10:40 
Początkowo opublikowane przez Omega:
Only affects systems with a separate TPM module, most systems today use a vTPM build in to the CPU itself.

Also someone requires the skills to actually do this, which very few people do.
But not every CPU has integraded TPM.
Ryzen pro and Intel Xeon for sure they have.
Omega 24 kwietnia 2024 o 10:45 
Początkowo opublikowane przez A&A:
Początkowo opublikowane przez Omega:
Only affects systems with a separate TPM module, most systems today use a vTPM build in to the CPU itself.

Also someone requires the skills to actually do this, which very few people do.
But not every CPU has integraded TPM.
Ryzen pro and Intel Xeon for sure they have.
Pretty much all modern CPUs have it.
76561199540158642 24 kwietnia 2024 o 13:04 
I know someone that has broken several flat screen tv's because the dogs got rowdy, it can happen
%a 28 kwietnia 2024 o 17:46 
anyways i saw a youtube video where someone can reset your local account password at the prompt to enter your password you need to go threw the cmd prompt thing and type uniman or something.
< >
Wyświetlanie 1-15 z 31 komentarzy
Na stronę: 1530 50

Data napisania: 23 kwietnia 2024 o 14:28
Posty: 31