I LOST MY PASSWORD  (PW) ? 

If using the  TPM chip level PW security , this is doomed, call the OEM for help, Dell, HP, ASUS, ACER, Lenovo ,etc.
The best cure (later) is  not using any BIOS PW ever.
The PC with HDD password set the data on that Disk is now gone forever. (it can be erased and reloading Windows from MS)
Next time write it down. (using upper and lower case clearly)
Lost it to what?
         There  are 6 levels of Passwords to lose (all you can do first is guess,... then see the below)
  1. BIOS  user PW (this can be disabled or reset using supervisor PW  if known below. (best is disable it)  (see newer PCs Backdoor PW unlocks)
  2. BIOS    supervisor/admin PW BIOS Password lockout problems)   ( and TPM blocks  , and aka. power on password) See Toshiba PW hacks.
  3. HDD locked (any kind)  encryption  or Bitlocker (hopelessly impossible and by "DESIGN !") (erase the HDD and fresh install the OS)
  4. Windows local login PW lost.  (and no USB key made)  (learn that each newer windows version is harder to hack, so always have and extra unused admin account and write it down!!!)
  5. Windows  7/8/10 live login PW only & cloud store .  Ask microsoft.com for help , nobody else can help you.
  6.  Email passwords ask them.  (gmail or live.com) vast email providers exist, in all cases ask them only. (gmail.com ask)
The newer the PC the more hard it is to cure this loss, by design and laws. ( as seen here, and common now world wide)

 HP (and other OEM) BIOS password resets  (see BIOS PASSWORD LOCK  see photos just below
See this web search for 1000's of wild examples of BIOS Password pop up window failures. ( If asking for help snap a photo of yours for 10 times faster and more accurate answers , and share it)
There are many evolutions  to Password storeage in all years of PC made from old and easy to new and hard nut tough.
  • RTC coin cell pulled resets PW lies. But gee it is now bad 15 years later and is soldered down to boot.  Endless lies and rumors on this topic but your RTC battery is now dead.(& BAD)
  • Desktop motherboard (MoBo) has clear PW jumper labled clearly that. or the wild ones see on old lame A200 Toshiba's
  • Stored in custom tiny EEPROM called (secretly) PW storage, and very hard to cure.
  • Has the backdoor PW as seen in 2010 year PCs.  We know how to do those.
  • Last is newer PCs very modern and guess what backdoor PW are now illegal. (the cure is not easy, call your OEM PC maker for help or google all weak long and make it worse.)


HDD encrypted and locked Hard disk drives of any kind.
The HDD password or FIPS grade Hard disk encrypted, lost my password can not be hacked. (guess yes, but if you guess too  many times it may do a self bricking action , now dead forever)
This is tricky some PCs have the HDD lock and the BIOS PW lock married,   if you get one right the other works.  (That means solve first lost PW , and pray the other does not ask later, yes,  PAIN)


The HDD hard disk drive may have drive encryption and drive lock turned on, in many cases this is a feature INSIDE the HDD, ( or both it and the BIOS in your PC)
This can not be hacked, all you can do is guess.
In many cases if you guess to many times wrong, the HDD secure erases the HDD as you stand there in horror. (this is feature some like and paid for...)
 
One more pesky window POP's up at power on time. (this is a BIOS locked PC)
Note the total lack of a logo or water mark or some identification as to the source of his window ! (btw, this is BIOS lowest level, locked)
HDD LOCK 1 , example. PURE STEALTH !
A very  OLD DELL BIOS admin PW,   This one can be impossible to clear. .
see jumpers below.

 
end HDD lock #1 ( I have no Dell unlock answers)

Backdoor Example #1: 
Back door Passwords (BIOS Only) as seen on PC old not new and have no PW jumpers inside.
First off lets do  my favorite PC, Dell.
Here  my page on Dell BIOS Password resets.

The best 1st clue is this:
This is no endorcement by me just random google searches by me. ( I never set BIOS paswords (PW) ever nor buy PCs used with them set ,ever) (this is for you NOT ME)
If  the error box shows a code after hitting enter 3 times, that is what we call a BACK door PW.
Off site cures:  Here-1, and here-2 or here-3.
One more: 
BIOS-FIX.com( is not free) 35Euro up, can change with the winds direction I guess.

Watch out for scalpers or far worse web sites with infected web pages or payloads infected. (vast) (but numbers and letters (PW) are safe,  but EXE or scripts not)



BACK DOOR PW unlock methods.
IF you hit ENTER 3 times and get some long funny looking KEY code,  bingo backdoor PW. (I can not decode them ever but online hackers have)

Some PC makers cure this easy if you can prove to them you own the PC, call them and ask. (FIRST)  Not Toshiba there ar now defunct in fact PC division sold 2 times now,  (fish eats fish style)
I will not cover,  HDD encrytion locks or TPM locks,  there is no cure for those only guessing might work and way out side my pay grade .
This is an HP BIOS message , note the lack of HP marks !  (more stealth ) This is  BIOS lock NOT HDD locked.
 If you hit the enter key  3 times and get funny i12345678 code that means there is back door password cure. (never will you see this act, on any Enterprise  grade laptops, PRO or ELITE BOOK)
code shows up (i12345678) call HP and ask for a decode of your PW hint, here.

end back doors.

A Microsoft.com (product) If wise avoid it. (if CIA, use it.)
 Bitlocker™,
locked. (this too happens before Windows can run or day anything at all. The whole reason this lock exists it to prevent hacking  or cracking the PW.
There are exceptions to any rule,  talk to your OEM maker of PC and ask for help, first. OK?
IF you get this  window below and lost the PW you are toast.  you will not break the 256b it AES encryption here.) (sure you can guess )
Note how nice , it told you it's bitlocker asking, what  brilliant idea that is.
On paper, 2256 may seem like a normal number, but don’t you dare underestimate its power.(my ti.com calculator shows, 2 to 256 power is 1.16-E77 decimal combo's.  Below is un-rounded number)
 256-bit will have 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936 (78 digits) possible combinations.
No Super Computer on the face of this earth can crack this. it will take millions of years to do so.  (not saying if you got one PW letter wrong say  L is l and bingo works. ok?)
Do not think for a moment the software below  lets you guess at  10,000 times a second, IT DOES NOT.  This BITLOCKER can be 40% slower than a good SED self encrypting HDD.
Aka, HDD encryption.  Some newer HDD do this inside the HDD itself, and is not crackable by design.
Guessing is limited:
Notwithstanding, say your Bitlocker PW was your moms maiden name,  say it's "Lovelace",   If you think you got the L wrong on one or both,  you  need 4 tries total on the L upper and lower.  (l + l , L+L , L+l and l+L) (only a human can know this and make it easy)
If you try too many guesses, see this (lock out timer active)
Watch out guessing some DRIVE lockers Auto self fast erase  the HDD if  you guess wrong too many times. (read your product spec, on this)
If you don't have MS Bitlocker you might have Seagate , WD , or Toshiba HDD built in HDD lock called FIPS , compliant HDD, or SSD.  This is not crackable either, read your HDD sticker, then read the data sheet on it to see if it has FIP'S.

The generic name is SED, Secure encrypted drive, but slow and less secure Bitlocker(tm) is popular.
For sure WD / Seagate and Toshiba and all drive makers have there own SED DRIVE LOCKERS.
Some HDD older can be attached over and over with hard resets. (but not the newer FIPS drives) a good 2009 old report fails to show FIPS)
For those sining any form of HDD lock learn what HDD you have first, OK then ask for help.
There are 3 generations of HDD,(SSD) simple no locks possible ,early encryption and new FIPS.
What you have and how it works can be learn by reading the HDD data sheet matching your exact HDD first.
When I say HDD that means hard disk drive or SSD, (solid state drives or m.2 cards)
Even more complex  is the FIP drives they have different levels of features,  think, FIPS1 , 2, or 3? or more as time goes on ,newer rules by our USA government.
The SED, is extremely  safe but very hard to hack, impossible is the goal so... keep that in mind.
One issues is if the BIOS forgets the SED key the PC is bricked, I have no solutions for that, all are the secret of the OEM maker of you PC, and not by accident , by DESIGN.|
The PCs BIOS stores the 256 bit Encryption key and you don't need to type out that key , so that means moving the drive to other PC fails after all your BIOS there has no idea what to here, at all.

FIPS 140-2 , level 4 , you will never hack (guess a few times, maybe) wiki, statements.

Level 1 and 2 , are in the wild, above are rare yet, very hard to get certified. (there are level 3 device, now and expanding now)
The FIPS drive can delete the CSP key and this bricks the drive.

Obviously the weakness of the HDD PW lock is the guessing the BIOS Admin (supervisor PW) and you are in, even 6 character PW like 123456, and you are in,(or "qwerty" LOL easy)
The HDD uses  256bit, Data Encryption Key (DEK)
The BIOS stores that and it uses,  Authentication Key (AK)., if your BIOS PW is 123456, the BIOS likes , then it issuse the DEK and the SED unlocks. Knowing this one line of facts tells you why the Drive is dead moved to 2nd alien PC.

If the blackhat thief stole only the HDD, he is faced with 256bit key to guess. (impossible.) (so he steals the whole PC and attacks it in the underground bunker all year. some PCs only allow 1 guess per 10seconds , so machine attacks are slow...) or as you guess wrong newer PCs, increase the delayed wait time to hours long and more.  (very smart this...)
Here is only great coverage on  SED , DRIVE usage.

Jumpers? were used for decades, but not now. (this would violate many laws now for new PC's)
Why not just read you manual first to see if this is there. Seen on many REAL DESKTOPS.  2010 made PCs here have it.
Learn this fact first "no 2 PC's made use the same PW reset methods for 2 decades:" learn that and that most posts online fail to even tell you what model PC theirs  is and is useless to you.
OLD  PCs long ago had JUMPERS. (Desktops and Laptops (some crazy hard to find only on laptops) Have this.
To find Laptop jumpers go to youtube and search see endless models of PCs and deep hidden jumpers, even marked XXX !
Learn this first, those videos mostly never tell you the exact model being hacked, and then you think yours is there,  and you will be dead wrong. (and all the risk that entails)
Legacy level 1 PW: 
(or any PW with jumpers)
If the RTC coin call battery is dead, all this is a super crazy wild waste of time  the battery must be replaced first. (or BIOS goes dead or far far worse it lies to you)
If a desktop it only takes me 5 minutes  to remove the left side case off, and looking at mobo for CLRPSWR or CMOS-clr or?
On those pesky laptops (notebooks and Pads) it can take an hour of labor to remove all cases , look for jumpers and the coin cell only to find out, IT IS NOT THERE AT ALL those jumpers, the COIN cell will be. (save a few old Toshiba's < avoid them)
 
ProBook 440 G2   (random Desktop example) but super common on all such PCs and their own jumper marks.
This is one of 1000s of photos at HP for 1000s of mother board listed on HP support site.

This is and example of the most easy way to reset a BIOS PW. (mostly legacy now)

Example #1:  of an old HP PC that has jumpers.
Finding the correct jumper is not hard if present.
The best way  to do this is learn to read the manual, RTM,  most manuals for Desktop, cover this, in the users guide or the service manual (HP.com and Dell.com do)
LOOK for the words, CMOS , PASS, PW, Clear, CLR,  and CLR-PSWD, Clear CMOS with white silk screened painted letters as seen above.
Some PCs respond (old) to just pulling the CMOS RTC "NVraM" COIN CELL BATTERY.  (all power removed, no batteries remain no power cords attached, and  push power button on dead PC  now then wait for 1 full hour)
This COIN cell trick only works on OLD gen 1 PC, with passwords stored in the NVRAM.  (some call this CMOS but is  not just one word, that is lazy talk, it's CMOS NVRAM, that is what it is. (the V = volatile)
The NVRAM forgets only if all power is dead. 100% dead (on my laptop there are 4 power sources, (AC pack, COIN, BIG Li-battery1, and BIG battery2 in the DVD bay (options I have). 
On some Laptops there is docking station, remove  that  first, as some have a battery or power there or both. (a 5th and 6th power source, amazing no?)
Desktops have only 2 power sources, PSU and COIN.
10000 mother boards made in 20 years all with different answers.

TOSHIBA PC maker is now defunct and sold 2 times now, first to dynabooks.com and now Sharp company , so with my pity here I show some PW HACKS. (BIOS)
I feel sorry for Toshiba owners and this is the opposite of any endorsements.  (I've shown enough jumpers to make finding other models of jumper more easy)
Full stop, do not look  in the  below section for NON TOSHIBA PC cures.
Some old and rare Lenovo PC did this same thing.
One folly is the RTC coin cell is not there, it is not a coin cell at all, it is Nimh 2 cell 3vdc rechargeable battery and hard to source. If dead all the below is useless until the battery is replaced (it solders down only)
You are here because pulling all batteries and AC power for a week (LoL) did not reset the PW, nor would  I expect that in this decade.

WARNING THIS  DOES NOT clear HDD encryption at all, by design. (reset BIOS , erase HDD (encrypted) and reload Windows.)
The maker of PC keeps these hidden jumpers a secret now, or no longer use them (by law too) .
The trick is to jumper the pad with a wire jumper , and power on at the same times holding jumper for 10seconds (at least)  ( if can do this and 1 DDR in place it may be more effective!)
In many cases the DDR bank sticks removed and if lucky only bottom hatches pulled to get to them.
Steps: (not documented by maker,  but is well know in the trade)
  1. Pull the huge MAIN battery in any laptop, (or if thin battery inside unplug it first)
  2. AC power pack disconnected. from the WALL AC power JACK. (never hot swap RAM)
  3. Remove HDD, is best, or unplug the 2 cables to it or , remove it from laptop , and is covered in the manual (RTM) or Youtube this PC disassembly.  (RTM = read the manual)
  4. Remove all bottom hatches, is best, for sure DDR RAM hatch cover, or if none, then remove bottom panel total. (again RTM or youtube how.)
  5. Pull out all DDR RAM, to see all things under and near here, this is, SO-DIMM classic memory for laptops.
  6. See  white/clear/black thin film plastic protector there un peel it and set it aside and look exactly there. (for jumper pads)
  7. Put back only 1 stick of RAM (DDR) so the easy access to the jumper happens now.  If jumper pad is easy to reach with no DDR pulled, then all is good like that.
  8. Find the jumper per below, photos.  (this really is the only hard part)!  As you can see the DDR may block  access to the jumper
  9. I always clean the jumper pads with IPA.! Q-tip used. (any near pure Alcohol or IPA)
  10. Put back only the  AC power pack for power for now. (no huge battery now)
  11. Using my jumper DIY tool hold it on to the , the jumper pads  XXX (or as see below B500?) and hold it jumped and  push the power on button to ON and hold it for 15 seconds (do power on and jump both at the same time !)
  12. Release all that, now. and boot the PC, is the PW gone?, if not the try a longer jump time and hold it now, for 30 seconds, The goal is no Password demands, now, and PC boots to Say windows.(if OS dead see next line)
  13. OK go in to BIOS pages turn off PXE in the NIC page and in the boot order turn off PXE there if seen now, and last make HDD0 first boot order device, in page of same name.
DIY TOOL#1:
I  use a brand  new pencil with virgin eraser on the end (flat not rounded and old) then wrap the eraser with mom's kitchen foil. Just the end and try to make end flat and pure aluminum there.
Clean the B500 pads with alcohol. {IPA} (a cue-tip from the bathroom)  IPA is   isopropyl alcohol  hospital grade, $1 at walmart)
Common names for this jumper are, XXX, B500, D500, J1, G1, G2, JCW, JCMOS, and JPW. (and lots more)
Big thanks to the person who do this web site this  persons, and web site for such huge coverage this topic. ALEXANDER MATHEW !  THANKS ! Nice work here.

NOW my ROGUES GALLERY:
MODEL L300 here.  ( how to do it my text file is here, step by step)  L300 series

Have one stick of DDR RAM present, but farthest from the B500 pads. for easy access .
Some models have mylar film shield glued here I must pull off in lower bank if see. (some do , some don't)


The 2 pads must be bridged with a metal conducting tool. see my ways above. I clean this pair of pads with IPA first.

One more the Defunct (PC) Toshiba maker A135 Laptop jump.  J1, some are XXX and B500  and other marks.(by model) and C75D on the right D500 jump.  (these set of photos shows the huge variance of locations)


Next is, a  Toshiable model C855 ,  near coin cell battery CR2032. (best is a fresh new battery too) 2012 made PC

Tight spot here,   the pad has no marking , and is what I call SUPER STEALTH MODE.  see this secret pink painted pads ( photo shop painted )
Very very hard to find and learn, this spot. wow.
 
As you see  the locations are wild variant and names of pads are not the same on all models and years. (just to be stealthy )
Do not jump things willy-nilly, only jump pads seen here or marked as J something) or XXX.  Jumping widely invites mobo blowing up.(damaged)
C655 below, is G1. (2007 year made) and L700 and L750
G1 works of C513 and
G2 is for C514 PC.
 (or Toshiba Satellite C660 C665 A660 A665 .)  Some or A305
DDR removed to see PCB. (no huge lithium Ion battery) AC pack only, the jumpers on some are XXX marked or B500, JCW,JCMOS  .(white painted letters called silk screened device I.D)
G1:

A600 to C600 series more common next  (DDR pulled, and huge white sticker must (some are JCMOS notched)  be removed, to see JCMOS pad pair;
Not JCW is now called JCMOS.   A215 series too? Plastic film removed. or XXX marked.
Some are maked D500 , JPW, XXX, JCMOS.

The A135 PC same DDR place but is marked J1 and only one pad not 2, and must be jump grounded to say the DDR clamp steel spring seen above.

C50 or C55 JPW jump (MFG, date 2005 ) 15 years ago, most are in the land fill now.
CPU Alum heat sink here, org. copper pads see here are it. JPW marked. near UC1.

C660 (last)  year 2005 again.
JPW again. under DDR RAM.(removed)

L300, XXX jump , year march 2008 made PC. 12 years ago from now.2020.



I am not doing all 300 models jumpers of laptops, no me not ever. (this is just to see how Toshiba names the clear PW jacks)

Some newer  Laptops only the back door PW  works to clear lost BIOS Password that only the CIA uses, gee.

TOSHIBA PC IS DEFUNCT (avoid them).  Read the bad news here.  (and horrible support not)
Link2:

This soldered down (toxic lead) RTC cell must be replace on this old PC, or BIOS can not work right, even lie to you.
The most sad story of all is this battery is dead and now BIOS lies to you and tells you there is PW that you never evers set. wow! Replace this over 10 year old battery first.

end jumper madness. (Toshiba loves to change jumper names , for kicks I guess)


TPM PW lost?, Never ever turn this on.  (or doomed it is now or later)
 (Trusted Platform Module {chip}) Avoid the Double Edged Sword of "promised security and then data death."
If you are not DOD,DOJ,CIA or FBI why are you using these dangerous feature?  ( good luck cracking this , most can not)
  
The whole purpose of TPM  is to keep any one from hacking your PC, even, omg YOU !
There are web sites (no links) that show how to  hack TPM chips even unsoldering it and buying new one for $20+.
There is no simple fix for this. (all progress is hard won if at all or worse you did fatal damage to PC hacking it.)
The relationship of UEFI and TPM is explained super well here by IBM , in one page.(thank you  IBM !)
  1. If you don't like this feature, then don't buy PCs  used with TPM enabled.
  2. or never turn on TPM in BIOS.
  3. Or never use Secureboot. (windows 10)
  4. or never use HDD encryptions.
The BIOS PW feature (1,2,3,4) are a trap, if you failed to backup you  data everyday, to external medium when you turn off this PC , you may never get back that days work.
The BITLOCKER feature is also a trap in the same way.
Learn to write down your Password, put this on small paper (post-it notes rule here) in a book only you know, and the page only you know. (or learn to uses SECURE NOTES HERE)

Avoid TPM = WIN ! No need to be paranoid of others seeing photos of grandma.?

Local LOGIN ONLY Windows 10 OS  Password HACKING, I will not cover all 14 versions of windows. no.
Before Hacking , backup your data first !
All version of Windows can be hacked, W10 is the most hard.
The best hack we are told is the Linux hack, using chntpw  (change NT Password) works windows 8.1 and older. OS. (it just changes it and does not need to guess the old one first)
The official statement from MS is to reload the OS,  (after all would they teach how to steal other persons private data? answer, no!, why would the?)
Each year the OS gets more difficult.  (go ahead and hack , XP or VISTA , all versions can be hacked, older are more easy sure.)
  1. Didn't write it down?   oops1 (try guessing yet:?)
  2. Did you make a password recovery disk,  day 1,?  no? oops2.
  3. Now are you going to reInstall the OS? now? (the MS official cure by them telling you?)   (your PC has manual, called the users guide and has chapter called "Recovery" read that first. RTM.
  4. On line many places sell a w10 PW hack APP. buy it and use it?
  5. Have an extra working ADMIN account , use that to change the account that is locked out.

In all cases Ask Microsoft.com first for help,  if they say, reload the OS then there you go, and most pages at MS say just that.

Next is: (local login's)

W10 , after many updates and newer builds can be very hard to hack , even impossible,  Some methods below are not free.   (and after the 2-Aug.2016 update most methods now fail ,due to AES128 encryption and HASH)
Learn one thing about W10 now, it is a moving target, at any time any day, MS can fix Password hacking methods, I say count on this.!
Windows 10, as of  2-Aug2016, updated (as all are now)uses  NTLMv2,  ASE128+MD4  encrpytion hashes now in the  SAM.
(That means All old  cracking disks (tools) now all fail .  ) 12+ character complex passwords  have all been harder to crack.
As will bitlocker.
Attacking the PC,  using  boot disk of any kinds, can be foiled. (even to you ,  lost PW)
UEFI  PC , and  safe boot  turned on,?  plus  BIOS passwords  protecting this. FAIL.
Then bitlocker on,  encrypted  HDD/SSD boot drive.(FAIL)
If  you did manage to  steal the  SAM file, good luck cracking it. (Copied to a usb  stick and attack  it  on  another  PC?.)
Many tools do not work now, below  is a list ... I do not know if they work, for sure after July 2016.



The W10 hack site 1:

The W10 hack site 2:


The Microsoft home page for W10 down load will burn any DVD or stick with W10 installer,  (takes no retail COA key like W7 does, to DL it., so .... do that.)

Next time learn to write this password down on paper, and put the paper, in a book only you know, and page only you know. (I use PostIt notes so the slip of paper can not just fall out of my book)
All this is done  to protect your data,   even banking transaction data, etc...


WINDOWS LIVE: (not local as shown above)" 100% Microsoft facts"  This is what you get for using LIVE !
Rule #1, only Microsoft can help you here, nobody else can hack Microsoft online servers.  For sure not you.
The Microsoft live login , (if you said yes during the install of W10 then you are using  the Microsoft LIVE CLOUD login,  to reset that , as millions have is there.)

Cured only by going to Microsoft live and doing  request there.                       And this MS policy page.
If these answers on the above line fail you must call Microsoft on the telephone (Cell phone/CELL) and ask for help. (be ready to pay CASH)
  • In the USA, (800) MICROSOFT (642-7676)
  • In Canada, call (877)568-2495
  • In India, contact 0008004402130
  • In UK, contact 0800 026 03 30
 
 The below is fake  live.com login example, only you know your, live email login password.  (next time write it down in a secret place only you know, hide it in a book? only you know and page #?) 
W10,  the cute blue squares are you owly clue here.  No words saying this is Microsoft Windows 10. But it is Windows for sure, as it shows.
This is a live login, not local at all.  (always keep this fact in your head if  true)
Microsoft has many older live login ways, hotmail, office login's and Xbox 360 login's.
Commonly it can be your Outlook.com or  hotmail.com, live.com, webtv.com, xbox.com, msn.com, or other Microsoft-provided email address is already your Microsoft account.
AOL.com, Gmail.com , yahoo mail,Yandex Mail, GMX.com and more 1000's more , even private mail servers like I own.  
Even owners with Office 365, have an office email account that can work as the W10 login.
Do you use the Microsoft Store [y/n]?  if yes you  have an  account there at Microsoft.
Do you use the Microsoft Cloud? same deal as the store.

Only you know how you login, like see above, it is live.com (or the MS cloud login)
The MS page on this is here.(the CAN'T LOGIN PAGE)

Next time learn to write this password down on paper, and put the paper, in a book only you know, and page only you know. (I use PostIt notes so the slip of paper can not just fall out of my book)


Proactive,? get lastpass.com  use it.  (even store odd Passwords in Add Item + secure  note, put any BIOS PW there)

If the RTC coin cell goes dead the PC may think  the PC is being hacked, (even asks for PW that did not exist ever!) Put in a new battery.
RTC NVRAM CMOS Coin cell battery , below 2.9vdc is bad and going bad faster. Get ride of all bad batteries. (replace them)

This page is not for thieves of any kind. It is only to true owners of PC and now want their data back, yes you can get lucky.   This page is mostly all RUMORs and for sure only valid at all on some PC's. YMMV.

version 6  .  8-1-2017  v1. .