In XP and the earlier Windows versions, there was only one administrator account and most single users used it as their main account. But Windows Vista (and Windows 7) has another, what may be referred to as a secret ‘super’ administrator account. It is hidden & turned off by default, and is similar to the ‘root’ account in Unix.
To turn on this ‘super’ administrator account, type cmd in the search box WAIT don’t hit enter! cmd will appear at top. Rt click on it to ‘run as administrator’.
To enable this account, type this command & hit Enter:
Net user administrator /active:yes
To disable this account, type this command & hit Enter:
Net user administrator /active:no
If you decide need a password for the administrator’s account that you are going to activate or if you are unable to activate it with a blank password:
Net user administrator P@$$w0rd
Net user administrator activate:yes
Hit enter. You will get a message: The command completed successfully.
(Where P@$$w0rd has been taken as an example password)
Switch user and log on using this password.
ALTERNATIVELY, you may also type secpol.msc in the search box and hit enter. This will bring up the Local Security Policy.
In LHS, click on Local Policies > Security Options.
Now in RHS you will see the first entry as Accounts:Administrator Account – Disabled
Rt-click on it > Click Properties > Enable. Close.
And why would you want to operate this account?
- You don’t want to be ‘annoyed’ by UAC.
- This ‘super’ administrator account has elevated privileges. This means that you can run CMD with an un restricted access to the command line.
- You have locked out your main account by accident and you want a back door entry.