Home > Products > Windows Passwords > Reset Windows Password > Screenshots
Reset Windows Password screenshots
17.04.2024
Reset Windows Password v14.2
Telegram data recovery, Photo Database and Media Player investigation tools, and some more
12.04.2024
Office password recovery tools
Resetting VBA passwords
01.03.2024
New blog post
Dumping the history of users' IP addresses in Windows
20.02.2024
Reset Windows Password v14.1
IP addresses history viewer, fast disk search, local security editor and some more

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password screenshots

Reset Windows Password was developed for resetting, changing, or recovering Windows logon passwords. For example, when the computer Administrator's password is lost or forgotten. To this day, Reset Windows Password is the most functionally richest solution in its class. The application supports all versions of Windows (based on NT), works with Active Directory, uses artificial intelligence power for recovering passwords instantly to certain accounts, can load hard disk drivers 'on the fly' and demonstrates a number of additional unique features.

The program's interface is carried out as a step-by-step wizard. Therefore, the operation process does not seem complicated to even an inexperienced user. For example, resetting an administrator password takes just three simple steps:

  1. Selecting SAM and SYSTEM registry (the application automatically searches all hard drives of the computer for the files.)
  2. Choosing a user account.
  3. Resetting the password.

Reset Windows Password

First, the program suggests selecting one of the recovery modes: Local accounts - regular user accounts stored in SAM registry, Active Directory - server accounts stored in NTDS.DIT database, Domain accounts - domain user accounts stored in SECURITY registry, Passwords - password recovery tools, User activity - recent user activity, Forensic tools - system investigation and forensic tools, Files and drives - miscellaneous tools to work with files, folders, drives, disk images and so on, Utilities - other features. As you make the selection, the list of operations should be available for the mode.


Local accounts



Active Directory



Domain accounts


 

Passwords


 

User activity

Forensic tools

Files and drives

  Utilities





Schematic description of logon types

SAM
A regular user account of any home PC. Password hashes are stored in the SAM registry file on the same computer.
SAM authentication


ACTIVE DIRECTORY
A domain user account. Password hashes are stored in NTDS.DIT database on domain PC.
Active Directory authentication


DCC
Cached credentials of domain accounts. Password hashes can be stored (depending on the domain security policy) on the local PC. The account login is performed either through the domain or using the cached credentials.
DCC authentication

DCC cache authentication