Posted February 23, 201015 yr I read your explanation on this post and was really impressed. I hope you can help me with a glitch I can't seem to figure out. Windows XP Home Edition SP3 IE 7 I have an Admin. acct and standard user account for the internet. When installing something from a CD-Rom(e.g. PC game), I can only do it via the Admin account. The definition given for a standard user was that they could install as long as it did not interfere with the system/system files, which is why I did not choose the Limited acct. When I tried installing via standard user, it blocked and said I needed Admin. priviledges. Is it possibly the game itself? Some don't require this. Also, if I have to install via Admin. accct., how can I adjust so I can play as Standard user ? Note: I believe the game CD-Roms I have require an internet connection to play via their Game Manager(e.g. Bigfish games and iWin) But some games don't require this. I don't want to play games under my Admin. Acct., it is not secure is it? Thanking You in Advance(for being there and helping) "Shenan Stanley" wrote: > century.dave wrote: > > I created a new user but forgot to add member to admin. I changed > > computer to a new WORKGROUP and restarted computer. Now I can > > only log on as new user without admin priveleges and cannot restore > > because I don't have admin priveleges. Because there is only one > > user in this WORKGROUP, there is no admin. and I can't log on to a > > different WORKGROUP. > > WHAT TO DO? > > Shenan Stanley wrote: > > Did you change the computer from a DOMAIN to a WORKGROUP? > > > > There is no 'workgroup-wide administrator' in any case. > > > > If you were a member of a domain and now are not and you do not > > know the local 'administrator' (that is the username by default) > > password - you may need to go to those who setup the computer to > > find out or use one of a number of free programs to reset the > > password. You can see if the administrator user's password is > > blank (assuming you have Windows XP Professional or superset OS > > since you seem to have been a member of a domain) by pressing > > CTRL+ALT+DEL twice at the welcome screen logon and entering the > > username "administrator" (without the quotation marks) and putting > > nothing at all in the password blank and trying to logon that way. > > > century.dave wrote: > > I am able to get to a log on page, but administrator and "blank" > > password did not work. remember, I created a new WORKGROUP and the > > "new user" (without admin) is the ONLY user in the workgroup. I > > severed the computers' link to the original domain because that > > domain doesn't exist any longer, so I can't log back on to the > > original domain where I had admin priveleges to modify a users > > access or even do a "restore". > > > century.dave wrote: > > How can it be possible to set up a workgroup with only one user and > > the one user doesn't have admin priveleges? without admin > > priveleges, you can't undo changes, you can't change workgrups. > > Again - there is no such thing as a user in a workgroup. > There are local machine accounts and domain accounts - workgroups do not > have accounts. > > What this thread indicates to me is that you used a domain account that had > administrative priviledges to remove the machine from said domain without > first creating a local account with administrative priviledges. You have an > administrative level account on the machine. You either don't know this > because you have not looked and/or have not tried the suggestions made. You > need to 'hack' into the local administrative account or clean install said > machine. > > What I have given you is several ways to access the local administrative > user account and/or change the local administrative user account's password > so you can utilize it to log into the machine locally. Being a member of a > "workgroup" means very little. The machine is still just a stand-alone > machine with only local user accounts. > > All Windows XP machines are members of a workgroup - whether or not they did > this intentionally or if there is NOT more than one machine involved. The > built-in administrator account cannot be deleted - so it still exists. If > you utilize some of the links I will be providing you again - you should be > able to access this account - usually (by default actually) the username on > the account in question is "administrator". You can even change the > password for this account. > > Your only recourses (given what you have) seem to be: > - Try to hack the administrator password > - Clean installation. > > Around the first solution: > You need to know what version of Windows XP you have to try > the easiest fix. If they have Windows XP Home Edition or some other version > of Windows XP (all supersets of Windows XP Professional.) > > If Windows XP HOME: > Boot into safe mode and logon as the user named "Administrator" --> it > likely has no password. Change your password and any others needed > once you get logged into safe mode as the actual (and hidden in normal > mode) administrator in Windows XP Home. Reboot and log back in as > your user with the new password. > > If Windows XP Professional: > At the "Welcome Screen", press CTRL+ALT+DEL twice in a row (quickly.) > That will bring up the Classic Logon Prompt. Enter "administrator" as the > username (no quotation marks) and try entering nothing (leave it blank) > for the password and log on. If it lets you in, cChange your password > and any others needed. > > Doesn't work? > > Look through these: > http://www.google.com/search?hl=en&q=forgotten+password+in+%22Windows+XP+Home%22 > > Look through those who had this issue before you: > http://groups.google.com/groups?as_q=forgotten+password+in+%22Windows+XP+Home%22&num=100&scoring=r > > What Microsoft recommends: > How to log on to Windows XP if you forget your > password or if your password expires > http://support.microsoft.com/kb/321305 > > Here's a list of possible things to try: > http://www.petri.co.il/forgot_administrator_password.htm > > Including a downloadable diskette or CD: > http://home.eunet.no/~pnordahl/ntpasswd/bootdisk.html > .... with instructions clearly on the page for use. > > > Around the second solution (with extras): > ** You may want to print this ** > > 1) Download and install Belarc Advisor onto the current Windows XP > machine. Use it to get a list of hardware from the > machine as well as the CD Key used to install it. Print it if you like. > http://www.belarc.com/ > > You may be able to obtain other product keys from here as well. > You will see everything that is installed listed here - so you have > a record of what you will be putting back - if you have the > installation media. Now is the time to find the installation media! > > 2) Using the list of hardware you obtained - visit the hardware > manufacturer(s) web page(s) and download the software drivers > for each of the components. > > If it is a "vendor" computer (Dell, HP, IBM, Gateway, etc..) - simply > visit the vendor's page and go to the support/downloads for the > particular model and download all hardware drivers. Write those > to external (to that computer) media. CD/DVD/USB/Network. > > If it is a piece-meal computer, take the Belarc list and visit each > manufacturer's web page. Be sure - at a minimum - to obtain the > motherboard chipset drivers, the hard drive controller card drivers, > the video card drivers, the modem drivers, the network card > drivers and the sound card drivers. Technically - if you have the > drivers for the hardware that will allow you to access the Internet, > everything else can be gotten later. However - there is something > to be said about going in prepared. > > 3) Now that you have the software and hardware drivers covered - > you can get to the business of obtaining Service Pack 2 and most > of the post-sp2 updates you will need. I have a list with links > below this - if you grabbed everything on this list - installed them > (after installing Windows XP) in numerical (by KB Article #) order > - rebooting when asked to - before ever connecting to the Internet > - you might (at this time) have 5-10 more to grab from the update > web page. > > Essentially - visit each of these pages, download the update for > Windows XP (32bit) w/SP2 and save them to an external location. > CD/DVD/USB/Network. Consider yourself an "IT Professional" in > order to get to the page with the actual file download link for each > update. > > You could get away with (pretty much) installing them in the order > given. > > Direct Download of Service Pack 2 (SP2) for Windows XP > http://snipurl.com/8bqy > > Critical Updates > ---------------------- > Released: -- [ Web Page Address ] -- Description: > 9/14/2004 -- [ http://support.microsoft.com/kb/885626 ] > -- Critical Update for Windows XP > 11/22/2004 -- [ http://support.microsoft.com/kb/887742 ] > -- Update for Windows XP > 12/13/2004 -- [ http://support.microsoft.com/kb/885835 ] > -- Security Update for Windows XP > 12/13/2004 -- [ http://support.microsoft.com/kb/885836 ] > -- Security Update for Windows XP > 12/13/2004 -- [ http://support.microsoft.com/kb/886185 ] > -- Critical Update for Windows XP > 12/13/2004 -- [ http://support.microsoft.com/kb/873339 ] > -- Security Update for Windows XP > 2/7/2005 -- [ http://support.microsoft.com/kb/891781 ] > -- Security Update for Windows XP > 2/7/2005 -- [ http://support.microsoft.com/kb/888302 ] > -- Security Update for Windows XP > 2/7/2005 -- [ http://support.microsoft.com/kb/887472 ] > -- Security Update for Windows Messenger > 4/11/2005 -- [ http://support.microsoft.com/kb/890859 ] > -- Security Update for Windows XP > 5/18/2005 -- [ http://support.microsoft.com/kb/894391 ] > -- Update for Windows XP > 5/24/2005 -- [ http://support.microsoft.com/kb/896344 ] > -- Update for Windows XP > 6/13/2005 -- [ http://support.microsoft.com/kb/896358 ] > -- Security Update for Microsoft Windows XP > 6/13/2005 -- [ http://support.microsoft.com/kb/896428 ] > -- Security Update for Windows XP > 6/24/2005 -- [ http://support.microsoft.com/kb/900930 ] > -- Update for Windows XP > 6/27/2005 -- [ http://support.microsoft.com/kb/898461 ] > -- Update for Windows XP > 7/11/2005 -- [ http://support.microsoft.com/kb/901214 ] > -- Security Update for Windows XP > 8/8/2005 -- [ http://support.microsoft.com/kb/896423 ] > -- Security Update for Windows XP > 8/8/2005 -- [ http://support.microsoft.com/kb/899587 ] > -- Security Update for Windows XP > 8/8/2005 -- [ http://support.microsoft.com/kb/899591 ] > -- Security Update for Windows XP > 8/8/2005 -- [ http://support.microsoft.com/kb/893756 ] > -- Security Update for Windows XP > 10/10/2005 -- [ http://support.microsoft.com/kb/901017 ] > -- Security Update for Windows XP > 10/10/2005 -- [ http://support.microsoft.com/kb/902400 ] > -- Security Update for Windows XP > 10/10/2005 -- [ http://support.microsoft.com/kb/905749 ] > -- Security Update for Windows XP > 10/10/2005 -- [ http://support.microsoft.com/kb/905414 ] > -- Security Update for Windows XP > 10/10/2005 -- [ http://support.microsoft.com/kb/900725 ] > -- Security Update for Windows XP > 12/12/2005 -- [ http://support.microsoft.com/kb/910437 ] > -- Update for Windows XP > 12/13/2005 -- [ http://support.microsoft.com/kb/904706 ] > -- Security Update for Windows XP > 1/9/2006 -- [ http://support.microsoft.com/kb/908519 ] > -- Security Update for Windows XP > 2/13/2006 -- [ http://support.microsoft.com/kb/911927 ] > -- Security Update for Windows XP > 4/10/2006 -- [ http://support.microsoft.com/kb/911562 ] > -- Security Update for Windows XP > 4/18/2006 -- [ http://support.microsoft.com/kb/904942 ] > -- Update for Windows XP > 4/25/2006 -- [ http://support.microsoft.com/kb/900485 ] > -- Update for Windows XP > 4/25/2006 -- [ http://support.microsoft.com/kb/908531 ] > -- Security Update for Windows XP > 5/9/2006 -- [ http://support.microsoft.com/kb/913580 ] > -- Security Update for Windows XP > 6/6/2006 -- [ http://support.microsoft.com/kb/916595 ] > -- Update for Windows XP > 6/8/2006 -- [ http://support.microsoft.com/kb/918439 ] > -- Vulnerability in ART Image Rendering Could Allow Remote Code > Execution in Internet Explorer for Windows XP SP2 > 6/12/2006 -- [ http://support.microsoft.com/kb/914389 ] > -- Security Update for Windows XP > 6/12/2006 -- [ http://support.microsoft.com/kb/917953 ] > -- Security Update for Windows XP > 6/13/2006 -- [ http://support.microsoft.com/kb/917344 ] > -- JScript 5.6 Security Update for Windows XP SP1 and SP2 > 6/27/2006 -- [ http://support.microsoft.com/kb/911280 ] > -- Security Update for Windows XP > 7/10/2006 -- [ http://support.microsoft.com/kb/917159 ] > -- Security Update for Windows XP > 7/10/2006 -- [ http://support.microsoft.com/kb/914388 ] > -- Security Update for Windows XP > 8/7/2006 -- [ http://support.microsoft.com/kb/917422 ] > -- Security Update for Windows XP > 8/7/2006 -- [ http://support.microsoft.com/kb/920670 ] > -- Security Update for Windows XP > 8/7/2006 -- [ http://support.microsoft.com/kb/922616 ] > -- Security Update for Windows XP > 8/7/2006 -- [ http://support.microsoft.com/kb/920683 ] > -- Security Update for Windows XP > 8/17/2006 -- [ http://support.microsoft.com/kb/920872 ] > -- Update for Windows XP > 9/11/2006 -- [ http://support.microsoft.com/kb/920685 ] > -- Security Update for Windows XP > 9/11/2006 -- [ http://support.microsoft.com/kb/922582 ] > -- Update for Windows XP > 9/11/2006 -- [ http://support.microsoft.com/kb/919007 ] > -- Security Update for Windows XP > 10/9/2006 -- [ http://support.microsoft.com/kb/922819 ] > -- Security Update for Windows XP > 10/9/2006 -- [ http://support.microsoft.com/kb/924496 ] > -- Security Update for Windows XP > 10/9/2006 -- [ http://support.microsoft.com/kb/923414 ] > -- Security Update for Windows XP > 10/9/2006 -- [ http://support.microsoft.com/kb/923191 ] > -- Security Update for Windows XP > 11/14/2006 -- [ http://support.microsoft.com/kb/920213 ] > -- Vulnerability in Microsoft Agent could allow remote code > execution > 11/14/2006 -- [ http://support.microsoft.com/kb/923789 ] > -- Vulnerabilities in Macromedia Flash Player from Adobe > could allow remote code execution > 11/14/2006 -- [ http://support.microsoft.com/kb/924270 ] > -- Vulnerability in Workstation Service could allow > remote code execution > 11/14/2006 -- [ http://support.microsoft.com/kb/928088 ] > -- Vulnerability in Microsoft XML Core Services could > allow remote code execution > 11/14/2006 -- [ http://support.microsoft.com/kb/923980 ] > -- Vulnerability in the Client Service could allow remote code > execution > 12/12/2006 -- [ http://support.microsoft.com/kb/926247 ] > -- Vulnerability in Simple Network Management Protocol (SNMP) > could allow remote code execution > 12/12/2006 -- [ http://support.microsoft.com/kb/926255 ] > -- Vulnerability in Windows could allow elevation of privilege > 12/12/2006 -- [ http://support.microsoft.com/kb/923694 ] > -- Cumulative security update for Outlook Express > 1/9/2007 -- [ http://support.microsoft.com/kb/929969 ]
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.