Skip to content

Penetration Testing Tools

  • Home
  • Data Forensics
  • Ethical Hacking
  • Mobile Hacking
  • Network Attacks
  • Vulnerability Assessment
  • Web AppSec
  • OSINT
  • Code Assessment
  • Malware Offense
  • IoT
  • Cryptography
  • Arsenal Lab
  • Hardware/Embedded
  • Malware Defense
  • Network Defense
  • Reverse Engineering
  • Smart Grid/Industrial Security
  • Home
  • Data Forensics
  • Ethical Hacking
  • Mobile Hacking
  • Network Attacks
  • Vulnerability Assessment
  • Web AppSec
  • OSINT
  • Code Assessment
  • Malware Offense
  • IoT
  • Cryptography
  • Arsenal Lab
  • Hardware/Embedded
  • Malware Defense
  • Network Defense
  • Reverse Engineering
  • Smart Grid/Industrial Security

Penetration Testing Tools

  • Windows

Microsoft confirms that Windows 10 v1809 will accidentally disable the local Administrator account

by ddos · January 3, 2019

The latest official blog of Microsoft reminds users that if they try to upgrade from the old version to Windows 10 Version 1809, the administrator account may be disabled.

For example, if the administrator account is enabled on the Windows 10 April Update, the administrator rights account will be disabled and cannot be logged in after upgrading the new version.

This issue primarily affects users who use the local Administrator account. If the user is using a Microsoft online account, then this will not be affected.

And coming to the current article, the issue happens in below cases where

  • The built-in administrator account is active
  • Other account present that has administrator rights.

In addition, you can use the account with other administrator privileges to log in to the system and you can enable the Administrator account again. Microsoft will fix this problem this month.

Via: techdows

Tags: local Administrator accountWindows 10 v1809

Follow:

  • Next story USB-IF launches a certification program for USB-C to defend against hardware-level attacks
  • Previous story Windows 10 v1809 does not display FLAC lossless metadata correctly

Search

MAKE THE WEBSITE ONLINE

  • Popular Posts
  • Tags
  • command execution

    Ethical Hacking

    Living-off-the-COM-Type-Coercion-Abuse: achieve stealthy command execution by abusing implicit type coercion

    May 19, 2025

  • openedr

    Network Defense

    openedr: full blown endpoint detection and response capability

    April 20, 2025

  • PSGumshoe

    Data Forensics

    PSGumshoe: Windows PowerShell module for the collection of OS and domain artifacts

    April 21, 2025

  • Obfuscation Detection

    Malware Defense / Reverse Engineering

    Obfuscation Detection: Detect obfuscated code and interesting code constructs

    April 21, 2025

  • Windows binaries

    Reverse Engineering

    WinDiff: allows browsing and comparing symbol and type information of Microsoft Windows binaries

    April 22, 2025

  • 5G Amazon AMD Android Apple ARM Artificial intelligence Asus ChatGPT chrome Dell facebook Firefox Github google Google Chrome Huawei India Intel Lenovo LG Linux Linux Kernel MediaTek Meta Micron Microsoft microsoft edge Mozilla MSI Nvidia OpenAI Qualcomm Samsung SK Hynix Sony TSMC twitter ubuntu windows Windows 7 Windows 10 Windows 10X Windows 11 Xbox




Reward

Brilliantly

SAFE!

meterpreter.org

Content & Links

Verified by Sur.ly

2022

  • Home
  • About Us
  • Contact Us
  • DMCA NOTICE
  • Privacy Policy

Penetration Testing Tools © 2025. All Rights Reserved.

x