How to cancel the boot password set by the computer

When you need to protect the security of computer data, you will set the boot password, but how to cancel it when you don't need it? The following is the method of canceling the computer boot password I sorted out for you. I hope it is useful to you!

How to cancel the computer boot password

1. Cancel user account password

Click "password of the current user" in the control panel, and then click "delete password of the current user" to open the dialog box, and then click "delete password of the current user".

Another method is to right-click "my computer", select "management", then expand "local users and groups", select "users", right-click the corresponding user on the right, select "set password", then leave the input box blank, and directly click "OK" to cancel the computer startup password.

2. Cancel the system startup password

The system startup password will appear when the system is loaded, which is equivalent to that the computer has two layers of password protection. Click "start", select "run", enter "syskey" and press enter. At this time, the dialog box "ensure the security of Windows XP account database" will pop up, and click the "update" button. In the "startup password" dialog box, select "password startup" and enter the set password.

If the "system generated password" option is selected, the system does not need to enter a password at startup. The system startup password is a password loaded before the operating system is up, which is displayed before the user account password. Enter "syskey" during operation, select "update" in the pop-up dialog box, then select "system generated password" and "save password on this machine", and click OK.

3. Cancel BIOS boot password

When the computer is turned on, press the Del key (generally press the F2 key in notebooks) to enter the CMOS setting, move the direction key, select "advanced BIOS features" enter, and select "security option" or "password check".

Press enter to pop up the interface for entering the password. Finally, press F10 to save and exit, so that the BIOS boot password can be set. After entering CMOS, set "set supervisor password" to "disabled". If there is no way, you can buckle the battery on the motherboard and wait for a while. In this way, the BIOS boot password will be automatically cancelled and the motherboard time needs to be reset.

Tips for setting computer security protection to keep computers away from hackers

I. computer settings

1. Close "file and print sharing"

File and print sharing should be a very useful function, but it is also a good security vulnerability for hackers when it is not needed. So we can turn it off when there is no need for "file and print sharing". Right click network neighborhood, select properties, and then click file and print sharing to remove the check boxes in the pop-up file and print sharing dialog box. Although "file and print sharing" is turned off, it can not ensure security. We also need to modify the registry to prohibit others from changing "file and print sharing". Open the registry editor, Select the "hkey_cur_rent_user \ software \ Microsoft \ win windows \ CurrentVersion \ policies \ network" primary key, and create a new key value of DWORD type under the primary key. The key value is named "nofilesharingcontrol", and the key value is set to "1" to prohibit this function, so as to prohibit the change of "file and print sharing"; the key value is "0" to allow this function. In this way, in the "properties" dialog box of "network neighborhood" File and print sharing "no longer exists.

2. Disable the guest account

Many intrusions further obtain the administrator password or authority through this account. If you don't want to use your computer as a toy for others, it's better to prohibit it. Open the control panel, double-click: user and password:, click: Advanced tab, and then click "advanced" button to pop up the local user and group window. Right click the guest account online, select properties, and select "account deactivated" on the "general" page. In addition, renaming the administrator account can prevent hackers from knowing their administrator account, which will ensure computer security to a great extent.

3. It is forbidden to establish an empty connection

By default, any user can connect to the server through an empty connection, enumerate accounts and guess passwords. Therefore, we must prohibit the establishment of empty connections. The method is to modify the registry: open the registry "hkey_lo_cal_machine \ system \ currentcontrol_set \ contro| \ Las", and change the key value of DWORD value "re_strictanonymous" to "1".

II. Install necessary security software

We should also install and use the necessary anti-virus software in the computer. Anti virus software and firewall are necessary. Open them when surfing the Internet, so that our security is guaranteed even if hackers attack us. It is recommended that you install mainstream anti-virus software, such as 360 or Jinshan.

III. close unnecessary ports

Hackers often scan your computer port during intrusion. If a port monitoring program (such as net_watch) is installed, the monitoring program will have a warning prompt. If you encounter such an intrusion, you can use the tool software to close the unused port.

IV. don't reply to strangers' emails

Some hackers may pretend to be in the name of some regular websites, and then make up a high sounding reason to send you a letter asking you to enter the user name and password of the Internet. If you press "OK", your account and password will enter the hacker's mailbox. Therefore, don't reply to strangers' emails casually, even if they say something beautiful and attractive, they won't be fooled.

V. change administrator account

The administrator account has the highest system authority. Once the account is used, the consequences will be unimaginable. One of the common means of hacker intrusion is to try to get ad_ The password of the administrator account, so we need to reconfigure the administrator account.

First, set a powerful and complex password for the administrator account, and then rename adminis_ Trator account, and then create an administrator account without administrator permission to deceive intruders. In this way, it is difficult for intruders to find out which account really has administrator rights, which reduces the risk to a certain extent.

Vi. Hide IP address

Hackers often use some network detection technology to view our host information. The main purpose is to get the IP address of the host in the network. IP address is a very important concept in network security. If an attacker knows your IP address, it is equivalent to preparing the target for his attack. He can launch various attacks against this IP, such as DoS (denial of service) attack, flood overflow attack, etc.

The main way to Hide IP addresses is to use proxy servers. Compared with directly connecting to the Internet, using proxy server can protect the IP address of Internet users, so as to ensure Internet security. The principle of proxy server is to set up a "transit station" between the client (the computer on which the user accesses the Internet) and the remote server (if the user wants to access the remote WWW server). When the client puts forward a service request to the remote server, the proxy server first intercepts the user's request, and then the proxy server transfers the service request to the remote server, so as to realize the connection between the client and the remote server

Obviously, after using the proxy server, other users can only detect the IP address of the proxy server instead of the user's IP address, which realizes the purpose of hiding the user's IP address and ensures the user's Internet security. There are many websites that provide free proxy servers. You can also use proxy hunters and other tools to find them yourself.

VII. Prevent Trojan horse program

The Trojan horse program will steal the swimming information implanted in the computer, so we should also prevent the Trojan horse program from being implanted by hackers. The common methods are:

1. When downloading files, first put them into your new folder, and then use anti-virus software to detect them, so as to prevent them in advance.

2. Check whether there are unknown running items in the "start" → "program" → "start" or "start" → "program" →: startup "option. If there are, delete them. Take" run "as all the items under hkey_local_ma_machine \ software \ Microsoft \ win dows \ CurrentVersion \ run in the registry