This computer is configured to require a password

*
This guide covers just how to actually resolve the “This computer is configured to need a password in order to start up” error that has been popping up on many kind of XP devices. This process just takes a couple of minutes for an professional user however could take some additional time for inskilled users. Interestingly this procedure also works for many kind of various other objectives such as restoring the Windows regisattempt after corruption as soon as a drive has negative sectors.

You watching: This computer is configured to require a password

From what we’ve watched this shows up to be pertained to a virus that allows SAM (regisattempt file) encryption. Therefore, utilizing standard password transforming devices such as NT PWD Reset wont settle this problem. What we have to do is to reclaim the regisattempt documents to their pre-infected state. Even many knowledgeable users aren’t mindful that Windows XP stores almost daily registry backups covert in a folder on the root of the drive dubbed “System Volume Information”.

Obviously you can’t boot this computer from the difficult drive because of the password, so you’ll either must boot from a live CD or remove the difficult drive and also connect it to another PC. Once you have accessibility to the Hard Drive go into the “System Volume Information” folder. If you get access denied errors you might have to take ownership of the folder first. You have the right to google “Take ownership” for plenty of guides on that action.

*

Once in the folder you will certainly see an additional folder called “_restore…” adhered to by a bunch of gibberish, open that folder. 

*

Once inside you will certainly see a list of folders, these contain regisattempt backups and also device restore data, sort by date to watch what day varieties are obtainable for recoexceptionally. Normally I choose a date around a week prior to the incident occurred just to be safe.

See more: Best Way For Hp Sparekey - How To Reset Or Remove Bios Password On Hp Laptop

*

Once you choose a day to restore from, enter that folder and also it will look like this… we want to open up the snapswarm folder

*
Almany done, You will certainly now see 4 papers which are duplicates of the Windows regisattempt from the day you selected. The 5 registry documents we are interested in are highlighted however should be recalled prior to they deserve to be restored to the Windows directory.

*

I created a practice batch file to do every one of this work-related for me automatically which is at the bottom of this short article yet for simplicity you have the right to rename the highlighted documents by simply right clicking and renaming:

Rename “_REGISTRY_USER_.DEFAULT” to “default”Rename “_REGISTRY_MACHINE_SECURITY” to “security”Rename “_REGISTRY_MACHINE_SOFTWARE” to “software”Rename “_REGISTRY_MACHINE_SYSTEM” to “system”Rename “_REGISTRY_MACHINE_SAM” to “sam”

Now select those 5 records you simply created (default, protection, software program, system, sam) and paste them into the “Windowssystem32config” folder and overcompose the existing papers.

You have currently brought back your Windows regisattempt to the day you schosen. As long as the day you selected was before the infection Windows need to boot normally. If you still check out the password prompt and also should go earlier to a additionally day you have the right to sindicate repeat this procedure and choose an older date.

See more: How To Remove Or Reset Samsung Bios Password, Samsung Laptop Bios Password Removal

Here is a batch file to automate the procedure, simply run it from within the snapshot folder. It assumes the difficult drive is plugged into a test bench and also is the “d” drive, you deserve to modify the drive letter for whatever before drive yours is.


echo offEcho copy regisattempt batch fileecho.echo location this batch file right into the mechanism volume indevelopment catalog you want to useecho.copy _REGISTRY_USER_.DEFAULT defaultcopy _REGISTRY_MACHINE_SECURITY securitycopy _REGISTRY_MACHINE_SOFTWARE softwarecopy _REGISTRY_MACHINE_SYSTEM systemcopy _REGISTRY_MACHINE_SAM samecho.ren d:windowssystem32configdevice device.oldren d:windowssystem32configsoftware application software application.oldren d:windowssystem32configsam sam.oldren d:windowssystem32configprotection security.oldren d:windowssystem32configdefault default.oldecho.echo.copy default d:windowssystem32configdefaultcopy security d:windowssystem32configsecuritycopy software application d:windowssystem32configsoftwarecopy mechanism d:windowssystem32configsystemcopy sam d:windowssystem32configsamecho.echo Done