Solved

Understanding OSX Mavericks/Parallels 10/Windows 8.1 Passwords

Posted on 2014-11-19
2
383 Views
Last Modified: 2014-11-23
Understanding OSX Mavericks/Parallels 10/Windows 8.1 Passwords

Since I changed OSX Mavericks login password [from power-up], A password is no longer required at power-up. Why?

Logging into Parallels 10/Windows 8.1 from OSX does not require a password. Why

Control Panel\All Control Panel Items\User Accounts opens with User Account ‘Jim Lacey’ as Standard Account. Change to Administrator not allowed [Change Account Type greyed out]

Control Panel\All Control Panel Items\User Accounts\Manage Accounts - Select Another Account reveals 3 accounts:

Jim Lacey - the power-up login account, Standard Account, Administrator not allowed [Change Account Type greyed out]

JAMAROSX$ - Local Account, Administrator not allowed [Change Account Type greyed out]

Guest - no issue here.

In C:\Users I find 2 accounts: JAMAROSX$ and JAMAROSX. JAMAROSX does not appear in Control Panel\All Control Panel Items\User Accounts.

JAMAROSX$ likely was created when I had Parallels 10 crash/reinstall.

As neither User Account ‘Jim Lacey’ or JAMAROSX$ is an Administrator Account, JAMAROSX must be, as there must be at least one Administrator Account in Windows 8.1.

As JAMAROSX account is unavailable at sign-in How do I access JAMAROSX account?
0
Comment
Question by:MARSPATH
2 Comments
 
LVL 78

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40460683
command-x will bring up a menu (click on command prompt run as administrator) or bring up the start screen type cmd (if you have a mighty mouse) you can right click and run as admiistrator
from  the command prompt
net user administrator /active:yes
net user administrator yourfancypassword   // this sets the password for the administrator account

if you look in your keychain you will see the windows login and also your login to the mac.
0
 

Author Closing Comment

by:MARSPATH
ID: 40460946
I see there is much to learn, thanks.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Using the Hyper-V Manager requires administrator rights. This guide shows how to add shortcuts and Start Screen tiles for normal users to quickly connect to local virtual machines rather than using the recommended Remote Desktop connection.
The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now