Everything can be hacked, if someone tries hard enough, a bios boot password could be of some help but that is also hackable.
When you use regedit to remove the password you can delete any field with refrence to internet or cache. The account reverts to local. there's many links in the forums on how to do this...
im talking about a comp thats not yours and lock to a MS account...how would u regedit that? their third party software out their that can try to crack the pass or PIN like the F.B.i CD Tool.
Jeez, Boot into WinPE, run regedit & load the SAM file from their HDD. or Pull their HDD, plug it into your system, run regedit, load their SAM file from their HDD. No need for 3rd party tools...
It's useful to add it into your winre.wim. You'll have to mount your install.wim 1st to access it... That's assuming you want it on every install...
I did not think people in this age of time still need to know this information, but alright. As long as you use a standard Windows/Linux/Anything install, your install can be read flat-file booting a CD/USB with a WINPE/LINUX OS or by taking out your HDD and reading from their OS. To fight this people put a password on their BIOS/UEFI and restrict boot to HDD, encrypt their whole system and turn on Secure Boot to fight evil maid attacks. But people can still try take out your HDD and brute force (try out all passwords in existence) the password to get in using specialized software, although this takes a enternity on most systems (that is if your password is complex). Also if you use a PC, people can also reset the BIOS/UEFI password on most systems by simply removing the CMOS for 30 seconds or a password clear jumper (temp restricted removal) where they do not need to remove the HDD. But in all these examples, they physically need access to your system, which you control 'most' of the time. The second layer of vulnerability is from your OS and You, the third layer is your network and the internet.
I add WinRE ramdisk entry to the Windows Boot Manager. Start PC with MSDART boot medium and Winre.wim with the Winre.wim inclusive masdart copy folder replaced on the system partition. Code: 1. bcdedit -enum all 2. bcdedit -displayorder {ca497cd0-c15f-11e5-9ee6-0800278db2d6} -addlast 3. bcdedit -timeout 5