How do I remove Novell Client - without having Administrative Priv.

Posted on 2011-05-11
Last Modified: 2012-05-11
Have a situation here...  where there are some old laptops that could be used by employees...  but they have Novell Client on all of them.  Several IT people have left here since those days and nobody knows an administrative p/w to be able to log in that way and UnInstall.  We are only able to go in as a generic user, with no authorities.

Is there a way ANYBODY knows of to eliminate Novell Client from this machine?  Then, we could join the network it is suppose to be on w/ the normal network admin p/w. (which Novell could care less about).
Question by:martzciu10
    LVL 27

    Assisted Solution

    For instances within our company when the Local Admin password is lost or set to an unknown we use this free suite.
    You can download and burn an ISO. The suite allows you to do a multitude of things, including resetting the Admin password.
    LVL 19

    Accepted Solution

    Ususally you would have to have local admin credentials as well to join a domain, so even after removing the client you're stuck.

    If you do have local admin credentials you can just login to the Novell client with a regular user, then use runas /user:administrator cmd.exe to start a dos-box in admin mode. There you fire up appwiz.cpl to remove the Novell client.

    Or as David-Howard suggest use some offline password changing tool like pNordahl's password change utility:

    Author Closing Comment

    Pogostick worked wonders to wipe out the local admin p/w and allow for all the other things necessary in joining on to the proper network.  Big thanks - great job both Experts!
    LVL 27

    Expert Comment

    Glad you were able to correct the issue.
    Just out of curiosity, was there any specific reason as to why you chose pogostick over Trinity?

    Author Comment

    Honestly, there were firewall/web blocker restrictions that made trinity very difficult to get to via our network and pogostick was something we happened to be able to get ourselves to.  No reason to believe Trinity wouldn't have been successful.  Thank you to both you and deroode for the great pointers.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    Sometimes people don't understand why download speed shows differently for Windows than Linux.Specially, this article covers and shows the solution for throughput difference for Windows than a Linux machine. For this, I arranged a test scenario.I…
    For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    731 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now