Hi, I'm just talking about my own experience. I used Vista from february 2007 to january 2009 (when I decided to install and test Win 7 releases from 69xx to 7600 RTM). The only and one thing that horribly annoyed me in Vista was that #?!& UAC. So the very first thing I do when I (re)install Vista/7 on my machines is to activate the super admin account, so I have no more annoying "Are you sure to be sure to be certain of being sure that you clicked that icon ?", followed immediately by a "Well, are you really really really sure ?" dialog box every 5 seconds. UAC is less "aggressive" in 7, but still exists. And I like to have full powers and rights on my systems (knowing inherent risks), so I use 7 in super admin account too. Of course, I have a good antivirus (Kaspersky 2010) and a correctly configured router. I don't go on suspicious websites, don't paste my time downloading tons of warez softwares... And since 2007, I never had to regret my decision concerning using super admin account everyday. I never had a single problem, a single hack, virus or spyware ! So my advice is that you can use super admin account, as long as you know what you're doing, you don't download and install pirated softwares with tons of virus, have a good antivirus, a good firewall or a perfectly configured router. ++
I apologize to wisestar cause I even include that enable admin account in my Unattend Program for Vista/Seven, cause people requested it Uhh why not just disable UAC? I'm religous about keeping an acronis image will put me back and I also use system restore before I install something. Just last 5 day's I have fixed 3 PC's for free for people at work by talking them through system restore and then do a malwarebytes scan and several other progs. And one of those wasn't working Inet for 3 months ;( I'm an unattender so been doing that for awhile cause I also program and have a similar app to Vlite but mine does the Apps and a FULL xml or at least the important parts. I just got 7600.16385 down and was starting work on 64 bit since I now have a fair 64 bit PC, that enable worked in 7127 but haven't done it in later vers
Hi guys, this is a cool trick. One guess I have for the reason it's disabled is so that brute force attacks always fail because a real admin account name is unknown to the attacker. One ability is a regkey that will rename the admin account, at least on windows server versions. This lets you use it, while protecting from brute force attacks. I don't really understand what abilities you gain with this account? With UAC turned off every admin account should have full powers, right? I think you still can't open folders like C:\System Volume Information without taking ownership of it. Is it dialog box warnings or is it access denied errors that you would get with a normal admin account?
Thanks man!! Will do this at next install Ah, question: when you do this, you have only one single userprofile (the superadmin), is that correct?
soo?? is that right? and another question. I do this command in the cmd window. And then? type "exit" and I am at the install screen again and have to type "Administrator" as my account name? I just want to be sure how to do that, thats why I'm asking this details