Solved

Dell E6400 lost System Password

Posted on 2013-01-31
3
494 Views
Last Modified: 2016-11-23
We have a bunch of Dell laptops. On one of the E6400 Latitude, we were experimenting with the fingerprint reader. Somehow we set a system password which is required every time we boot, and have been getting in by using the fingerprint reader. This prevents anyone else from powering up the machine, I have been using it like that but want to give access to others. Since it is reading the fingerprint you would think there must be a way to remove it, however it seems to want the password.

So is it possible to remove the system password by using the fingerprint reader? I spent 1/2 an hour on line with Dell today, but after all of that they said they had to pass me to basic support since this particular machine does not have PRO or Gold support like others. Of course in the process of transferring me I was dropped.

Before I go through the tech support channel again I want to make sure I have ruled out every other option.

Help appreciated.
Thanks
Doug
0
Comment
Question by:ddp1960
  • 2
3 Comments
 
LVL 26

Expert Comment

by:pony10us
ID: 38841504
On a Lenovo there is software that you can access once you are logged into the machine. There is a control panel where you can turn off the reader, change the fingerprints, etc.

Not sure what that would be on a Dell though. I think its something like DigitalPersona
0
 

Accepted Solution

by:
ddp1960 earned 0 total points
ID: 38847769
Ended up having to locate a tool to erase it. Closed.
d
0
 

Author Closing Comment

by:ddp1960
ID: 38863290
No other viable solution was provided.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video discusses moving either the default database or any database to a new volume.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now