New
#11
no, it gives the path as "C:\Users\Administrator" the path is the same, whether logged in from the regular admin or the Full, built-in Administrator (real admin privileges).
no, it gives the path as "C:\Users\Administrator" the path is the same, whether logged in from the regular admin or the Full, built-in Administrator (real admin privileges).
starts1234,
For some additional info, consider downloading:
ReProfiler | Free software downloads at SourceForge.net
Right-click the zip file and extract it to its own folder on the Desktop.
Open the Reprofiler folder, and double-click the Reprofiler application.
The program's console opens titled: Profiles in C:\Users
It shows you the Assigned folder to each User, and also shows the SID.
You can use the Snipping tool to provide a screenshot and let us see what appears on the ReProfiler console:
How to Use the Snipping Tool in Vista
okay. I'll get to work on that. Maybe I confused the issue.
I am thinking the "built-in administrator" account is the one with Full privileges, which is enabled by "net user Administrator /active:yes."
And an account labeled "Administrator" is not the "built-in administrator."
there is only one "built-in" admin but there can be many administrator accounts.
is that correct, or is it the other way around?
Yes you could enable the built-in Administrator by opening up an elevated command prompt and type in
Net user administrator /active:yes
When you create a new user account you could either have the user be a Standard user or an Administrator .
Stars,
If the account has the name "Administrator", then it's the built-in Administrator account. That's the only account with that name, and it is the one with full elevated unrestricted rights. :)
Please go ahead and log on to any of your other administrator accounts that will let you do so without any errors, then do the tutorial below to fix the account that you are getting this error with.
User Profile Error - Logged on with a Temporary Profile
Done. solved. Thanks Brink, Vistaking, Cottonball (that prgrm helped identify the account). The 500 key was the Administrator profile key. It didn't show up on the named administrator account I was using--only from looking at the registry with a new, named administrator did I see both ...500 & ...500.bak--strange. 500 path was c:\Users\Temp. While the ...500.bak path was c:\users\Administrator. I deleted each registry key while logged in with the new, named administrator. checked for the keys again with the named administrator account I was using when I originally started. that user, when running regedit, still showed the ...500.bak. I deleted it again. logged off/rebooted. Went to the built-in Administrator. It told me it was creating my desktop. The spinner was on for about 5 minutes while it did this (I was worried). It finally came up--and voilą! my built-in Account is back. and checking from my other, named administrator accounts, the keys are normal and there is no ...500.bak in the list. Thank again! -- one problem down, others to go (ha). situation normal. Good Job!
Last edited by stars1234; 21 Jul 2013 at 02:02. Reason: add information
You don't want to have the built in Administrator account enabled at all time or use at all time . The 500 SID key is for the built-in account .
To disable the built-in account do this
Open an elevated command prompt from an administrator account ( not built-in account )
Open up an Elevated Command Prompt. Click on in type CMD . Right click on CMD under Programs (1) choose . On the User Access Control window click on the Yes button . Command Prompt opens up to C:\Windows\System32>_
Type this command net user Administrator /active:no and press [ENTER]
You should see " The command completed successfully "