Laptop or computer safety specifications of one's superior it? Isn't heading to tell me which you allow the password? You ought to understand that the password can decode the break. So why then the laptop or computer starts to add a layer of protection in the course of it? This article will train you to make use of U disk to
1. Put together a U disk, the dimension does not issue, certainly sufficient for this software, and then format it.
2. Open Windows, a window (Explorer), not IE Oh, you need to understand that Windows GUI command interpreter could be the Explorer, after which open Folder Selections, within the
3. Open the Windows system partition, often the C partition, the boot.ini,
Microsoft Office 2010 Professional Plus, NTLDR, ntdetect.com duplicate the 3 files to your U drive.
4. Restart the personal computer,
Microsoft Office 2010 Professional Plus, enter BIOS setup, the USB device to the system of choice by default boot entry, and here we have to spend attention,
Microsoft Office 2007 Enterprise, to set a password for your BIOS,
Microsoft Office 2010 Professional Plus, don't overlook to preserve and exit.
so total, isn't especially painless, subsequent time you flip around the pc, the program will ask the boot USB products,
Microsoft Office 2007 Enterprise, if not provide U disk, the method will come across the other than the boot partition details failed to begin, no disk, then U won't be able to enter the system, but no chance of becoming exhaustive person password.
program, in case you are regrettable lost U disk U disk or data problems, or method challenges can't enter, you can comply with the way in which of recovery:
Put together a Windows method disk, boot the program having a program disk, enter the Windows Recovery Console. Inside the console enter the command bootcfg / rebuild, you will begin to see the following interface:
press R button once more to restore the technique.
Thus, there is no absolute safety, at least the situation that you simply computer can not fall into the wrong hands, in the context of restricted circumstances, this method was in a position to support your program with an additional layer of safety.