We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
How easy to get pass the password on laptop?
Comments
-
Does the laptop possess a Kensington Security Slot?0
-
-TangleFoot- wrote: »Does the laptop possess a Kensington Security Slot?
yes. it does have the slotProblem with having access to internet is that i get asked by many to solve their problemsWell at least i learn something on the way
0 -
Then you may consider the possibility of procuring a locking device.0
-
-
Whenever i get a new laptop i create the main account and limited account. Both password protected. Also where possible i create a password in BIOS. Does this make it hard to 'break' into the laptop if stolen?
Harder. Not Hard. It's better than nothing but it is not usually that hard to remove a BIOS password, even from a laptop.If you don't stand for something, you'll fall for anything0 -
unless the BIOS password is stored on an EPROM chip, then it's almost a guaranteed reset/removal with a bit of stripping down the lappy. If it IS on an EPROM, you need to get a blank chip, and replace it. Not impossible, but a right PITA.
Don't forget though, your average laptop thief will run away with the lappy, only to find some time later and probably a mile or so away that they can't do anything immediately with it......
...doesn't stop them nicking it in the first place...........Gettin' There, Wherever There is......
I have a dodgy "i" key, so ignore spelling errors due to "i" issues, ...I blame Apple0 -
As mentioned by others here, there are hundreds of password crackers for Windows out on the internet.
One mitigation to these would be to disable booting from floppy disc (assuming it has a floppy disk drive which I really doubt!), USB, CD rom and LAN, and boot only from the hard drive. This will stop someone plugging in a USB with the password cracker on it & rebooting it because when they reboot it windows will load first before the password cracker has had a chance to run.
Not fool-proof as someone could wipe the bios via opening up the drive but it would at least make it more of a challenge and probably something the casual thief wouldn't bother/know how to get around.
If you want to be really secure, I've used PGP whole disk encryption before that makes the drive useless even when removed.0 -
I've used PGP whole disk encryption before that makes the drive useless even when removed.
Self-destructing storage would achieve a similar result, though even then it is possible to retrieve data held in RAM because the system has to decrypt it in order to make use of it.0 -
Kon-boot, ophcrack to name but a couple, if you want the actual user's password.
I have a boot disk that'll reset a user's password in about 30 seconds.
As above, you don't usually see bios passwords because some they can be a devil to reset.
If you work your way to the cmos battery and take that out for an hour or so it may reset the bios. If not, you'll need the chip writer option.0 -
This discussion has been closed.
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 351.7K Banking & Borrowing
- 253.4K Reduce Debt & Boost Income
- 454K Spending & Discounts
- 244.7K Work, Benefits & Business
- 600.1K Mortgages, Homes & Bills
- 177.3K Life & Family
- 258.3K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.2K Discuss & Feedback
- 37.6K Read-Only Boards