Administrator and User Passwords in Windows XP


Can't Login To Windows? Locked Out? Forgot Your Password?  Click here.
If you can't get in/login to Windows there is a program that can do it automatically and instantly for you. Windows Geeks Password Removal Tool will remove all passwords including for Administrator on Vista, XP and NT/2000/2003 Servers/Workstation. 

One Step - No Hassle Solution!  Removes and Unlocks All Windows Passwords Instantly.
Click
 here for more information.
Direct Bootup Without Typing Password
1. At a command prompt, type "control userpasswords2" and press Enter to open the Windows 2000-style User Accounts
    application.
2. On the Users tab, clear the Users Must Enter A User Name And Password To Use This Computer check box and then
    click OK.
3. In the Automatically Log On dialog box that appears, type the user name and password for the account you want to be
    logged on each time you start your computer.
Remove Login Password
Control Panel/Administrative Tools/Local Security Settings/Minimum Password Length/Reduce it to 0 (No password required). Control Panel/User Account/Your Account/Remove Password. 
After you log on as an administrator to a computer that is not a member of a domain, when you double-click User Accounts in Control Panel to change the password for the built-in Administrator account, the Administrator account may not appear in the list of user accounts. Consequently, you cannot change its password.

This behavior can occur because the Administrator account logon option appears only in Safe mode if more than one account is created on the system. The Administrator account is available in Normal mode only if there are no other accounts on the system. 
 To work around this behavior:

- If you are running Windows XP Home Edition, restart the computer and then use a power user account to log on to the
  computer in Safe mode.

- If you are running Windows XP Professional, reset the password in the Local Users and Groups snap-in in Microsoft
  Management Console (MMC):

1. Click Start, and then click Run.
2. In the Open box, type "mmc" (without the quotation marks), and then click OK to start MMC.
3. Start the Local Users and Groups snap-in.
4. Under Console Root, expand "Local Users and Groups", and then click Users.
5. In the right pane, right-click Administrator, and then click Set Password.
6. Click Proceed in the message box that appears.
7. Type and confirm the new password in the appropriate boxes, and then click OK.
How to use the net user command to change the user password at a Windows command prompt. Only administrators can change domain passwords at the Windows command prompt.  To change a user's password at the command prompt, log on as an administrator and type:  "net user <user_name> * /domain" (without the quotation marks)

When you are prompted to type a password for the user, type the new password, not the existing password. After you type the new password, the system prompts you to retype the password to confirm. The password is now changed.

Alternatively, you can type the following command:  net user <user_name> <new_password>.  When you do so, the password changes without prompting you again. This command also enables you to change passwords in a batch file.

Non-administrators receive a "System error 5 has occurred. Access is denied" error message when they attempt to change the password.
If you set a computer for auto logon, anyone who can physically obtain access to the computer can gain access to all of the computer contents, including any network or networks it is connected to. In addition, if you enable autologon, the password is stored in the registry in plaintext. The specific registry key that stores this value is remotely readable by the Authenticated Users group.
As a result, this setting is only appropriate for cases where the computer is physically secured, and steps have been taken to ensure that untrusted users cannot remotely access the registry.
1. Start/Run/Regedit, and then locate the following registry subkey:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon
2. Using your account name and password, double-click the DefaultUserName entry, type your user name, and then click
    OK.
3. Double-click the DefaultPassword entry, type your password, and then click OK.

NOTE:
 The DefaultPassword value may not exist. If it does not:

a. Click Add Value on the Edit menu.
b. In the Value Name box, type DefaultPassword, and then click REG_SZ for the Data Type
c. Type your password in the String box, and then save your changes.

Also, if no DefaultPassword string is specified, Windows automatically changes the value of the AutoAdminLogon key
 
from 1 (true) to 0 (false), thus disabling the AutoAdminLogon feature.

4. Click Add Value on the Edit menu, enter AutoAdminLogon in the Value Name box, and then click REG_SZ for the Data
    Type.
5. Type "1" (without the quotation marks) in the String box, and then save your changes.
6. Quit Regedit.
7. Click Start, click Shutdown, and then click OK to turn off your computer.
8. Restart your computer and Windows. You are now able to log on automatically.

NOTE:
 To bypass the AutoAdminLogon process, and to log on as a different user, hold down the SHIFT key after you log off or after Windows restarts.

Note that this procedure only applies to the first logon. To enforce this setting for subsequent logoffs, the administrator must set the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon

Value: ForceAutoLogon
Type: REG_SZ
Data: 1
After you upgrade a Microsoft Windows 2000-based computer, Windows XP Professional may start directly to the desktop without stopping at the Welcome screen or requiring you to type a username and password. If you then create a new user account, you may not receive any option that allows you to log on by using the new account.
This behavior can occur if Windows 2000 was configured for automatic logon (Autologon). Windows XP inherits this configuration setting. 
To resolve this behavior, turn off the automatic logon feature and require a username and password at logon:

1. Click Start on the Windows taskbar, and then click Run.
2. In the Open box, type control userpasswords2, and then click OK.
3. In the dialog box that appears, click to select the "Users must enter a user name and password to use this computer"
 
    check box, and then click OK.

To work around this behavior, log off from the Autologon account, and then log on by using the new account.
 
When you create a new user on a Microsoft Windows XP Home Edition-based computer, you are not prompted to create a password.  To create a password for a user account, click the icon for the account, and then click "Create a Password".
By default, the Stored User Names and Passwords feature creates a "key" for any connection that you make in the graphical user interface (GUI) that requires alternate credentials. When you make a connection at a command prompt by using the net use command and by passing alternate credentials, a key is not created.
For the net use command to save the credentials in Credential Manager, use the /savecred switch. When you use the /savecred switch, any credentials that you are prompted for when you use the net use command are saved as a key.
Therefore, if you are prompted for the user name and password (or if you are prompted only for the password) when you use the net use command (but not because you used an asterisk [*] in the net use command for password prompting) and the /savecred switch, the credentials are saved.
When you type the net use * \\ computer_name \ share_name /savecred command, the user is prompted for a user name, and then the user is prompted for a password. 

When you type the net use * \\ computer_name \ share_name /u: domain_name \ user_name /savecred command, the user is prompted for a password.
 

However, when you type one of the following commands, a key is not created:
 
net use * \\ computer_name \ share_name * /user: domain_name \ user_name /savecred
 
-or-
 
net use * \\ computer_name \ share_name * /savecred /user: domain_name \ user_name
 

If you type net help use at a command prompt, more information is displayed about the net use command.
Password Has Expired Message
Start/Programs/Administrative Tools/Local Security Policy/Account Policies/Password Policy.  In the right pane, right click, properties, modify (use accordingly). And Start/Programs/Administrative Tools/Computer Management/Local Users and Groups/Right Click "User"(intended)/Properties...Or with Admin privileges, at a command prompt type: net accounts /maxpwage:unlimited.
To Create a Password Reset Disk
The Forgotten Password Wizard lets you create a password reset disk that you can use to recover your user account and personalized computer settings if you forget your password.  The steps to perform this task differ depending on whether your computer is a member of a network domain or is part of a workgroup (or is a stand-alone computer).

My Computer is on a Domain

Press CTRL+ALT+DELETE to open the Windows Security dialog box.  Click Change Password.
 
Click Backup to open the Forgotten Password Wizard. Click Next and then follow the instructions as they appear on the screen.
 

My Computer is not on a Domain

The steps to perform this task differ depending on the type of user account you have. If you have a computer administrator account:  Open User Accounts in Control Panel. Click your account name. Under Related Tasks located on the left side of the window, click Prevent a forgotten password. In the Forgotten Password Wizard, follow the instructions as they appear on the screen.
 

If you Have a Limited Account

Open User Accounts in Control Panel. Under Related Tasks located on the left side of the window, click Prevent a forgotten password. In the Forgotten Password Wizard, follow the instructions as they appear on the screen.
 

Notes: 
 To open User Accounts, click Start, point to Settings, click Control Panel, and then click User Accounts.
     Certain Programs Do Not Work Correctly If You Log On Through a Limited User Account. 
     After you log on to a computer by using a Limited User Account, you may observe one or more of the following 
     behaviors when you try to use a program that is not expressly designed for Windows XP. Information
 here.
Password Reset Disk Overview

To protect user accounts in the event that the user forgets the password, every local user should make a password reset disk and keep it in a safe place. Then, if the user forgets his or her password, the password can be reset using the password reset disk and the user is able to access the local user account again.
After you reset the password of an account on a Windows XP-based computer that is joined to a workgroup, you may lose access to the user's:  Web page credentials, File share credentials, EFS-encrypted files, Certificates with private keys (SIGNED/ENCRYPTed e-mail). More information in detail here.
I assume no responsibility for the purpose to which this information is used. This includes employees attempting to bypass restrictions put into place by System Administrators on corporate machines.
Boot up with DOS and delete the sam.exe and sam.log files from Winnt\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account will be blank (No password). This solution works only if your hard drive is FAT.  [Editor's note: Use with caution, there may be other ramifications from performing this tip.]
This is a utility to (re)set the password of any user that has a valid (local) account on your NT system, by modifying the crypted password in the registrys SAM file.  You do not need to know the old password to set a new one. 

It works offline, that is, you have to shutdown your computer and boot off a floppydisk. The bootdisk includes stuff to access NTFS partitions and scripts to glue the whole thing together. Note: It will now also work with SYSKEY, including the option to turn it off! 
 More information here.  Download here.
All Passwords-Master Copy
With Darn! Passwords! Just one password opens the safe that holds all those other ones for programs and web sites that require you to log in.  Download Here.

Just pick the password, and drag it and it's log-in (if there is one) into the program that uses it. No retyping is necessary (even in programs that do not accept the drag, you can just paste the password in). Go to the URL of a password protected site with the click of a button.
Passwords That Are Restored:

1. Program passwords are restored, such as Hotmail Messenger, AOL Messenger, Yahoo Messenger, and other Web server-based passwords. This behavior is by design: The programs simply cache these passwords; the actual passwords are
stored on a Web server. System Restore does not actually change the password, but it changes the password that is remembered by the program. You can use the current password for the program to log on to the server.

2. Domain and Computer passwords are restored. This behavior is by Design and is a limitation of System Restore. System Restore only rolls back the local machine state. Part of the information about joining domains resides in Active Directory, and Active Directory is not rolled back by System Restore.
The Migration Wizard does not migrate passwords. Passwords for Dial-Up Networking connections, Microsoft Outlook Express accounts, Microsoft Internet Explorer saved passwords, mapped drives, and so on will need to be reconfigured once the migration is complete.
The administrator account and password created during Setup are used to log on in Safe Mode only. To create a password for user accounts, double-click Manage Users in Control Panel.
Therefore, if you are prompted for the user name and password (or if you are prompted only for the password) when you use the net use command (but not because you used an asterisk [*] in the net use command for password prompting) and the /savecred switch, the credentials are saved.
When you type the net use * \\ computer_name \ share_name /savecred command, the user is prompted for a user name, and then the user is prompted for a password. 

When you type the net use * \\ computer_name \ share_name /u: domain_name \ user_name /savecred command, the user is prompted for a password.
 

However, when you type one of the following commands, a key is not created:
 
net use * \\ computer_name \ share_name * /user: domain_name \ user_name /savecred
 
-or-
 
net use * \\ computer_name \ share_name * /savecred /user: domain_name \ user_name
 

If you type net help use at a command prompt, more information is displayed about the net use command.
When the Welcome screen is appears, the names that are displayed do not match any of the names of users' folders under the Documents and Settings folder or any of the names on the Users tab in Task Manager.

This behavior may occur if you have changed the name of the account in the User Accounts tool in Control Panel. By doing so, the new name appears on the Welcome screen, but the actual account name remains the same. The folders under the Documents and Settings folder and the names that are listed in Task Manager show the actual account name.

To resolve this behavior, if the display name for a user account has been changed, you can find out which account the new display name belongs to by logging on as that user, starting Task Manager, and then clicking the Users tab.

The user account that is marked as active is the one that is currently logged on. Also, you can find out which of the folders under Documents and Settings belongs to the currently logged-on user by right-clicking Start, and then clicking Explore. Windows Explorer will then start in the Start Menu folder of the currently logged-on user's folder.
This behavior can occur for either of the following reasons:  When the default screen saver is set to use a non-existent screen saver program. And/or When you use a corrupted screen saver that is password protected. More Information.
The following registry setting is received every time the computer is locked:  Start/Run/Regedit

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon

ForceUnlockLogon
REG_DWORD

0 - Do not force authentication inline (default)
1 - Require online authentication to unlock

The preceding value controls whether a full logon is performed during the unlock process. This can force a validation at the domain controller for the user attempting the unlock process.

NOTE: If the value is not present, it functions as if it had been set to 0 (zero).
To use the shortcut, press the Windows logo key+L. The following list has different computer lock-up scenarios that are available to you, as well as other ways to lock the computer: Click Here.
Create a Shortcut to Lock Computer
Right click a blank space on the desktop, select new, shortcut. Copy and Paste this line: "rundll32.exe user32.dll,LockWorkStation" in the program location box. Click next and create a name for your shortcut, click finish.
Lock the Taskbar
This restriction is used to force the locking of the taskbar and restrict users from making any changes to its position. Start/Run/Regedit:  Navigate to this key and create a new DWORD value, or modify the existing value, called 'LockTaskbar' and edit the value according to the settings below.  Exit your registry, you may need to restart or log out of Windows for the change to take effect.
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
Value Name:
 LockTaskbar
Data Type:
 REG_DWORD (DWORD Value)
Value Data:
 (0 = Unlocked, 1 = Locked) 

Forgot your Windows admin password?


Reinstall? Oh no... But not any more...

  • This is a utility to reset the password of any user that has a valid local account on your Windows system.
  • Supports all Windows from NT3.5 to Win7, also 64 bit and also the Server versions (like 2003 and 2008)
  • You do not need to know the old password to set a new one.
  • It works offline, that is, you have to shutdown your computer and boot off a CD or USB disk to do the password reset.
  • Will detect and offer to unlock locked or disabled out user accounts!
  • There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
Windows stores its user information, including crypted versions of the passwords, in a file called 'sam', usually found in \windows\system32\config. This file is a part of the registry, in a binary format previously undocumented, and not easily accessible. But thanks to a German(?) named B.D, I've now made a program that understands the registry.
This site provides CD and floppy images for end users to easily edit their forgotten passwords. But it also provides full source code and binary builds of the tools to allow others to use as they like for other purposes. Registry format documentation also available.

Latest release is 110511 (2011-05-11)

The following is available for download and information:
2011-05-11
  • Some major! new features for people using the registry utilites, but not much changes to password reset.
2009-12-01
  • New site, official URL is now: http://pogostick.net/~pnh/ntpasswd/
  • All releases still contains old mail address, please note NEW mailaddress is pnh@pogostick.net. Old mailaddress vil be invalid after January 1st 2010.
  • No new release, 2008-08-02 is still newest. Hope to release new early 2010.

THIS SOFTWARE COMES WITH NO WARRANTY WHATSOEVER. THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE CAUSED BY THE (MIS)USE OF THIS SOFTWARE! 

Offline registry tools and password resetter


Here are the source code and binary downloads (see bottom of page) for the registry tools, along with documentation and release history.
This page is aimed at developers, tooldisk intergators, and system technicians. If you just need to use the tool to reset a password on your system.

Current features of the registry tools / library

Library:
  • Open several hives at once (they are however not linked in path-wise)
  • Add and remove keys (still not rename, sorry)
  • Add and remove values of any type. (no rename here either)
  • Read data in values
  • Put data into values.
  • (Recursive) iterate / list keys, get values types etc.
  • Recursive delete of keys
  • Read key "class" field
  • Expansion of the hive file now supported so you can add or import as much as you like!
  • Currently just ignores security descriptors in the registry.
  • Supports registry hives with different key indexing, so it covers all versions from NT3.51 to Vista/Win7 32/64bit and 2008 server.
Features of the tools (based on the library):
  • Simple interactive registry edit (command based), including hex edit of value data in unsupported value types.
  • Export of registry (or parts of it) to .reg file readable by Windows regedit.exe.
  • Import .reg file now in seemingly working condition. Will read files from regedit.exe, usually without changes. But currently slow.
  • Password reset, password change (partial)
  • User unlock
  • User promotion (add to administrators group. buggy)
  • Extract product key
  • Some syskey reset actions (NT4/2k/XP), but very risky.
  • .. and a lot of information and debug info for those who are interested.

This is news summary for the library and tools. Please see source and HISTORY.txt for more details.

2011-05-09 - New major features!
  • Hive expansion! Library now does hive file expansion by default if needed to when adding keys/values (but you can turn it off, safe mode). If expansion occured, you will get a warning when writing back.
  • .reg file import! Will read files from regedit.exe in most cases (UTF-16) but can miss on some international characters. Also reads "latin" (8 bit) files.
  • There were a lot of goofs by me in the add/delete key and value handling, which made windows complain and lose data. Hope I managed to fix them.
  • Also, found out more about how Windows does things, for example more details of empty name (default) value, zero-size values, large values (gets split internally) and other special cases.
  • Did quite a lot of testing by importing for example the SOFTWARE\Classes tree with regedit.exe and importing it again into the DEFAULT hive with my tool, then ask windows to "Load hive" (in regedit.exe). If it does not complain in the event log, it is good. (Also, seems like windows has gotten better at not bluescreening on a corrupt registry hive, did not get a single one when doing this with pretty messed up hives in win7 and Vista)
  • Be aware that .reg import is currently very slow, since I messed up the design for the string reading badly, and also the add routines is not exactly optimized. Consider it a proof of concept! Example: Import of SOFTWARE\Microsoft tree (exported by regedit.exe) into the small DEFAULT hive took more than 10 minutes on a pretty fast machine. Especially hex data is slow (one byte at a time.. lazy me..)
  • WARNING: .reg file import does not do much sanity checking of the input .reg file. It will either crash during import or mess up the registry if the .reg file is bad.
  • This version has no significant changes in the password (reset) handling part of the tools.
  • On TODO list for some of the next version: Windows like API. Faster .reg import. Fix bugs!
2010-06-27
  • Patches from Frediano Ziglio adding or fixing:
  • - buffer overflow in export_subkey printing keyname
  • - reg export: some quoting error (name and string values must be quoted)
  • - adding support for wide character encoding in keys and value names
  • - and some other bugs fixed
  • New function from from Aleksander Wojdyga to decode Digital Product ID. Now in registry editor, may be moved later. example dpi \Microsoft\Windows NT\CurrentVersion\DigitalProductId
  • Syskey menu selection has been removed from text, but can still be selected as number 2. So that people stop emailing me when it bombs out.
  • Some other minor tweaks
2009-12-01
  • New site, official URL is now: http://pogostick.net/~pnh/ntpasswd/
  • All releases still contains old mail address, please note NEW mailaddress is pnh@pogostick.net. Old mailaddress vil be invalid after January 1st 2010.
  • No new release, 2008-08-02 is still newest. Hope to release new early 2010.
  • Some of the newest releases (from 2008) seems to be working (more or less) on Windows 7 without any changes.
2008-08-02 Released a CD, but no changes to registry edit / password handling, chntpw etc.
2008-05-26
  • Fixed nasty bug which skipped first indirect index table when deleting keys. Usually threw recusive delete into a endless loop.
  • Type QWORD now recongnized. Believe it is from XP and newer systems.
  • Library functions accepting a path now has flag to say if search should be exact or on first match (partial string) basis.
  • Export to .reg file by Leo von Klenze (Thank you!), expanded to handle more types by me.
  • 64 bit compatible patch by Mike Doty, via Alon Bar-Lev, http://bugs.gentoo.org/show_bug.cgi?id=185411
2007-09-27
  • Fixed hang in bootdisk/CD
  • Also fixed a script crash in the floppy.
2007-09-26
  • User promotion now official! You can add a user into the administrator group, making the user an administrator!
  • Password edit has cosmetical changes / menu control
  • Some verbosity / text info has changed.
  • A few smaller bugfixes
  • Bootfloppy release is back. Better driver handling. Better NTFS handling.
2007-04-09 (guess it is 10 year anniversary!)
  • Now with Vista support! 32 & 64 bit. (NTFS filesystem driver now supports Vista)
  • CD has better driver support, changed quite a bit.
  • Mostly cosmetical changes to "chntpw" program.
  • Main password reset and regedit (chntpw + ntreg) code now made GPL licensed, for those of you who care. Source available at the source page.
2006-04-06, release 060213
  • Driver updates only, see download page for more info.
2005-03-03, release 050303
  • Driver updates only, see download page for more info.
2004-12-05, release 041205
  • New and improved driver probe on disk, now with probe based on PCI info. The CD/floppy should now work much better for SATA and other drivers needing multiple driver modules.
  • Fixed a small bug causing crashes when loading some hives (end pointer of last page seems to be way off sometimes). Thanks to Michael Rothstein for providing a hive file with this "weirdness"
2004-11-01 (no new release)
  • Added some info about "changes not taking effect" to the FAQ
2004-08-18, release 040818
  • Fixed critical bugs in regedit hive allocation routines, earlier versions may corrupt the hive when adding, expanding or deleting keys or values. Earlier version should be safe for password edit usually.
  • Added edit support for large keys (typically more than 500 subkeys), this happens often i SOFTWARE\Classes. As a bi-effect there is now full support for writing NT 3.51 registry, too. (it's related to key indices and indirect indices if many subkeys)
  • Regedit string input bugfix. Often crashed earlier. Several people reported this, with some suggestions. It's still ugly, however :/
  • Regedit recursive key delete 'rdel' added. It is rather slow however, and may hang or crash if given illegal key names. It also may produce some debug output in some situations.
  • Regedit 'hex' command to dump value in hex no matter what type the value is.
  • Regedit 'ck' command to dump class data of key, if it has any. (most keys does not have class data). Keys with classes are marked with * in the key listings. No edit of it yet.
  • Some bugs fixed in hive file load/save, and error handling. Thanks for reports from several people on this.
  • Generally NO CHANGES to password edit stuff.
2004-08-09: IN VERSION 0401xx AND EARLIER: Some rather serious bugs have been discovered in the allocation routines, which are used when adding or deleting values or keys in the registry editor. In best case, they leak space, in worst case, it may corrupt the file.
NOTE: This does not generally affect password changing, since password reset just overwrites a few bytes in place, it does not reallocate space.
 
SUMMARY: Password edit OK. Regedit may not be. Expect new version out within a week or so.
2004-01-16, release 040116
  • Completely new bootdisk system! Hopefully a bit easier to understand and run through.
  • Support for easy change of RecoveryConsole parameters (one of them tells RecoveryConsole to NOT ask for admin password).
  • A few bugfixes. For those of you wanting to look and build chntpw from the source, it should now compile??
2003-04-26:
  • Newer NTFS driver and internals of writebacks changed a bit on floppy, may fix some hangs reported on writing back to NTFS.
  • No changes to chntpw program itself
  • John Simpson supplies nice description on how to fix up lost admin password in ActiveDirectory.
2003-02-25:
  • NTFS "hang on writeback" bugfix on floppy/CD.
  • HighPoint (hpt) IDE chipset support added. No idea if it works.
  • Highly expermimental and not complete feature added: User promotion! Promote user into admin group.
    • Will add any user to administrator group, remove from all others.
    • VERY LITTLE TESTED YET!
    • Limitations: Not working on users which is not in any previous group, may not work at all on some setups, will not check policies: Guest can be promoted, but will most likely not be able to log in anyway because it is usually denied in security policies. I know how to do this, but it is not finished yet. This is still work in progress!
    • To use, enter @ at password prompt. Change is set even if you answer no on "do you wish to change" question. Please do not try it if you do not want to risk a complete system reinstall.
    • I need people that can test this on systems they are willing to risk a reinstall on! Please contact me if you have any info.
Earlier history removed.. (started in 1997)


User "manual" & tech info in the README file, or look inside the source. See the INSTALL file inside the archive on how tou build.
ntreg.c & ntreg.h now somewhat makes a rather complete library for access to the registry files. There is currenctly no documentation for the different function calls, and all functions may change in future releases. I plan on cleaning it up, and if possible mimicing the NT API.

Explanation of win3.11, win95 and NT registry files can be found in WinReg.txt, written by some German (I think, at least speaks German) named B.D. Sorry I don't have that persons full name, I can't find a name/address in the file, and it was not credited when I picked it up from some website. This is the original file as I found it, I've discovered some minor errors, but not corrected the file. Look it up in my sourcecode for more detailed info.