To what?
         There  are 5 levels of Passwords to lose. (more if using, "VeraCrypt" on anything)
  1. BIOS (see below HP BIOS)
  2. Windows local
  3. Windows  7/8/10 live login only & cloud store .
  4. Web passwords, (like AMAZON or EBAY,  banking, or the like(in all cases ask them, as only they can help.)  
  5. EMAIL , ask your ISP internet service provider, or if using web mail ask them.  (1000's of providers and web mail sites)

In the future, write your passwords down, on thin paper and put  it in a book (random) on a known by only you page number, ("Post-it-notes" are best so they can't fall out book rattled by thieves)
One ploy is to own many paper books in large book shelf, and you Post-it is fully safe. (grin)
For casual (non financial)Online passwords (like forums or facebook, etc) use LASTPASS.(gee it's even free)
Store banking passwords only in your head, never write them down anywhere or  on the actual PC in say a text file, that be a super bad idea.

#1 above,?
Hard to read are these documents, UEFI and TPM, both are and endless dive in to A QUAGMIRE.   ( for the simple users of PC's this is mostly Paranoia gone wild)
Better yet?, read your service manual at HP and see what BIOS security methods are enabled, and cures for lost low level passwords.
Or ask HP directly on their forum.
My laptop has a related issue, a finger print reader you will NOT get past, if you turn it on and this fails. (except HP direct help) (there is and INTEL "TXT" feature too , on some PC's that helps here.)

 HP BIOS password resets. Best is not to use it.  (if not doing CIA/NSA work, or other super secret work or other business or creative work, don't use it)

OLD PC's  HP computers, had 2 jumpers on the mother board,  named:

  1. PASSWORD RESET  (easy on old PC's, but on newer PC, 2008 + takes HP direct intervention.)
  2. The CMOS reset, (this empties out the NVRAM.  old PC only , very old had this method.
The HP now has a  TPM chip  located on the mother-board, a Trusted Platform Module) that if you set the BIOS PASSword, you will not get past this chip!  (it has dictionary attack blocks and is encrypted.)
The relationship of UEFI and TPM is explained here by IBM , in one page.
BIOS used to be simple, and some PC's now have upto 8 updates just for UEFI, it's so buggy. (I say (1/2 joking) wait till 2020 when its bug free)
I own a Elitebook that the UEFI is half working,  and will never be , full UEFI ever, (makes me happy)
The first step in this saga is to enter BIOS pages,  F10 or ESC , (old /new PC) hammer the F10 key at power on, and see BIOS, then see if you can enter BIOS and get to the SECURE PAGE, if not the BIOS is locked with a password.
Some early PC one can reset  this easy (2007 year) or is impossible,  by the way , that is the GOAL here,  the Impossible WORD !
#5 is HP direct intervention. (with a custom BINARY FILE)  This is no by accident it is by Design, you turned it on, now forgot the PassWord and you  or the BADGUY are blocked..

Here are the facts: (evolutionary)  Each year more difficult.
  1. All very old PCs by HP has  motherboard, bios PW reset. (many models did for 30 + years)
  2. All cheap newer Laptops, (HP) notebooks have a  backdoor PW, reset. code used in the PW box  , short sweet and easy to get. Ask at HP.com
  3. All Probooks, and Elitebook (expensive) this is for like the CEO of a company that does not want his/her data stolen!, so uses drive encryption and BIOS Passwords and there IS NO BACKDOOR by DESIGN! (and price point).
  4. The Pro/Elite books can only be reset at the TPM chip with a SMC.BIN file, Binary flash program to load that, and it resets it. (soldering in a new chip might work good luck finding it or a good new one)
  5. The BIN file must match you UUID,  that you give, HP support  and they GENERATE the SMC.BIN for you and will  not work on any other PC on earth ! (again; BY DESIGN!)
  6. That means if you stole the PC, and you did this , and the original owner calls HP and reports his proof of ownership; HP now knows who  stole it, don't they...?. The have your email and IP address, and more. Oops? "CUFFED"
  7. The UUID is a digital form a  PC serial number that only your PC has, 100% unique.   (and must match the exact BIN flash file HP gives you) Nobody else has your UUID.
  8. If you don't like this feature, then don't buy Executive level notebooks.  Buy consumer level PC's.  and save all that wasted cash.  If you paid $500 extra top get this, why did you , if you don't like it or use  it?
A universally unique identifier is a 128-bit number used to identify information in computer systems.  (kinda like the VIN number on cars , in USA but HUGE)
3.4028236692093846346337460743177e+38  , combo's (that is scientific notation)
Reads as a 3. with 38 zeros ofter it.  in simple terms... no I'm not typing 38 zeros for anyone....ever.
(on your calc push 2 then  the y/x key (below off key) then press 128 and enter. behold HUGE number,(Ti-30Xa- calc) also larger that
Quadragintillion. used mostly for counting Atoms. and the like, 2n128 power.

Local Windows OS  Password, I will not cover all 14 versions of windows. no.
Before Hacking , backup your data first !
The offical statement from MS is to reload the OS,  (after all would they teach how to steal other persons private data? answer, no!, why would the?)
Each year the OS get more difficult.  (if running relic and dead, now, XP or VISTA use google to hack it, these old OS are child simple  easy to hack. )
  1. Didn't write it down?  and hide it in a book,?  no? oops.
  2. Did you make a password recovery disk,  day 1,?  no? oops2.
  3. Now are you going to reInstall the OS? no? (the MS offical way)
  4. We land squarely on hacking. I will assume w7 or newer. (XP is dead and a virus magnet.)
Windows 7 HACK.  (no virus way is " copy d:\windows\system32\utilman.exe d:\" A.K.A; the login page, exploit !
W7 has  login screen exploit that allows manual hacking of 1 file to get ADMIN (cured in later releases, dig?)

W8 near same as above.

W10 , now things changed.
W10 was reEngineered to block such hacking (so they thought) It even hides the encrypted, code in  secret place and then moves it time to time to prevent hacking. (BY DESIGN) but. but but...
But the hackers are smarter than MS,  as it always seems? no? (warning MS may fix this method in future updates)
To boot a CD or USB memory stick  , go into BIOS (esc key at power on) turn off "secure boot". or all this fails., the F9 key will not boot to, CD/DVD/mem sticks.
We then boot a live OS DVD or stick. (linux works best, it don't hide files) "Any live boot CD that allows file access, works"
The W10 hack is here. (no virus adding app tools )! (he is using Linux)  One can use the free MS W10 install disk to gain, command prompt..

W10 hack site 2: see method 1, only (method 2 here is for CASH , Isee password disk, I'd never trust that ever)

I don't do hacks, but you can WEB SEARTH  it.  Windows 10 this is called the local Login and is not hackable. Reload W10 is the MS official cure.

Keep in mind if the HDD uses the MS or HP encryption feature, I bet all the above fails...  (by design!)

The HP has F11 recovery partition that gains access to the installer and command prompt.
The Microsoft home page for W10 down load will burn any DVD or stick with W10 installer,  (takes no retail COA key like W7 does, to DL it., so .... do that.)


The Microsoft live login , (if you said yes during the install) wille the Microsoft LIVE CLOUD login,  to reset that , as millions have is there.

Cured only by going to microsoft live and doing  request there.                       And this MS policy page. 

1 comment:

If you down load many EXE files to hack your PC, you will get infected. (with a nasty PC virus)

 This comments are only mine, and mine alone and are only OPINION. The real truth is all this STUFF varies by the year your PC was made.

version 1.  8-1-2017