Enter a previously saved recovery code
Enter a previously saved recovery code
Two-Factor Authentication
Two-factor Authentication (2FA) provides an additional level of security to your GitLab account. Once enabled, in addition to supplying your username and password to login, you’ll be prompted for a code generated by an application on your phone.
By enabling 2FA, the only way someone other than you can log into your account is to know your username and password and have access to your phone.
Overview
Note: When you enable 2FA, don’t forget to back up your recovery codes.
In addition to a phone application, GitLab supports U2F (universal 2nd factor) devices as the second factor of authentication. Once enabled, in addition to supplying your username and password to login, you’ll be prompted to activate your U2F device (usually by pressing a button on it), and it will perform secure authentication on your behalf.
The U2F workflow is only supported by Google Chrome at this point, so we strongly recommend that you set up both methods of two-factor authentication, so you can still access your account from other browsers.
Enabling 2FA
There are two ways to enable two-factor authentication: via a mobile application or a U2F device.
Enable 2FA via mobile application
In GitLab:
On your phone:
In GitLab:
If the pin you entered was correct, you’ll see a message indicating that Two-Factor Authentication has been enabled, and you’ll be presented with a list of recovery codes.
Enable 2FA via U2F device
In GitLab:
You will see a message indicating that your device was successfully set up. Click on Register U2F Device to complete the process.
Recovery Codes
Note: Recovery codes are not generated for U2F devices.
Should you ever lose access to your phone, you can use one of the ten provided backup codes to login to your account. We suggest copying or printing them for storage in a safe place. Each code can be used only once to log in to your account.
If you lose the recovery codes or just want to generate new ones, you can do so from the Profile settings ➔ Account page where you first enabled 2FA.
Logging in with 2FA Enabled
Logging in with 2FA enabled is only slightly different than a normal login. Enter your username and password credentials as you normally would, and you’ll be presented with a second prompt, depending on which type of 2FA you’ve enabled.
Log in via mobile application
Enter the pin from your phone’s application or a recovery code to log in.
Log in via U2F device
You will see a message indicating that your device responded to the authentication request. Click on Authenticate via U2F Device to complete the process.
Disabling 2FA
This will clear all your two-factor authentication registrations, including mobile applications and U2F devices.
Personal access tokens
When 2FA is enabled, you can no longer use your normal account password to authenticate with Git over HTTPS on the command line or when using GitLab’s API, you must use a personal access token instead.
Recovery options
To disable two-factor authentication on your account (for example, if you have lost your code generation device) you can:
Use a saved recovery code
Enabling two-factor authentication for your account generated several recovery codes. If you saved these codes, you can use one of them to sign in.
To use a recovery code, enter your username/email and password on the GitLab sign-in page. When prompted for a two-factor code, enter the recovery code.
Note: Once you use a recovery code, you cannot re-use it. You can still use the other recovery codes you saved.
Generate new recovery codes using SSH
Users often forget to save their recovery codes when enabling two-factor authentication. If an SSH key is added to your GitLab account, you can generate a new set of recovery codes with SSH.
You are prompted to confirm that you want to generate new codes. Continuing this process invalidates previously saved codes.
Go to the GitLab sign-in page and enter your username/email and password. When prompted for a two-factor code, enter one of the recovery codes obtained from the command-line output.
Note: After signing in, visit your Profile settings > Account immediately to set up two-factor authentication with a new device.
Ask a GitLab administrator to disable two-factor authentication on your account
If you cannot use a saved recovery code or generate new recovery codes, ask a GitLab global administrator to disable two-factor authentication for your account. This will temporarily leave your account in a less secure state. Sign in and re-enable two-factor authentication as soon as possible.
Note to GitLab administrators
The GitLab U2F implementation does not work when the GitLab instance is accessed from multiple hostnames, or FQDNs. Each U2F registration is linked to the current hostname at the time of registration, and cannot be used for other hostnames/FQDNs.
Восстановление пароля в Роблокс — как вернуть аккаунт
Автор: Юрий Белоусов · 30.12.2020
Нередко пользователи игровой платформы сталкиваются с необходимостью пройти процедуру восстановления аккаунта в Роблокс, например, если забыт пароль или, если аккаунт был взломан. Конечно можно смириться и создать новый профиль, но тогда все полученные в играх достижения обнуляться. А это не всем придется по душе.
В этой статье рассмотрим инструкцию, в которой подробно пошагово описано, как восстановить пароль в Роблокс и аккаунт, в случае взлома.
Как восстановить пароль в Роблокс, если забыл
Одна из самых распространенных причин утраты доступа к своему аккаунту – забытый пароль. Зачастую, пользователи не запоминают его и не записывают, а попросту доверяют его сохранность встроенному в браузер менеджеру паролей.
Если вы точно помните пароль, а он не подходит, то возможно на клавиатуре активирован режим Caps Lock. Необходимо его отключить.
Как восстановить пароль в Роблокс, если забыл:
Обратите внимание! Вполне возможно, что аккаунт создавался посредством входа в систему с помощью социальной сети Facebook. В таком случае на странице входа следует выбрать соответствующий способ.
Как восстановить пароль в Роблоксе с помощью телефона
Часто в качестве средства восстановления указывается не почта, а – номер телефона. Это куда более удобно и надежно.
Как восстановить пароль в Роблоксе с помощью телефона:
Как вернуть аккаунт в Роблокс, если нет почты и телефона
Как восстановить пароль от аккаунта Роблокс на телефоне
Рассмотрим, как восстановить пароль от аккаунта Роблокс на телефоне. Стоит понимать, что есть 2 инструкции: одна – для мобильной версии, то есть через браузер, а вторая – для приложения.
Восстановление пароля в Роблокс через браузер на мобильном телефоне:
Восстановление пароля в Роблокс в приложении Android, IOS:
Как восстановить аккаунт в Роблокс, если взломали
Процедура восстановления аккаунта в Роблокс, в случае, если он был взломан, ничем не отличается от описанной выше. В любом случае пользователю необходимо пройти процедуру восстановления пароля стандартным методом, описанным тут.
Если возникают сложности, то можно обратиться в службу поддержки. Русский язык недоступен, поэтому обращение нужно составить на английском. Для удобства можно воспользоваться Google переводчиком.
Как восстановить пароль Роблокс без почты
Восстановить пароль в Роблокс без почты можно только в том случае, если к аккаунту привязан актуальный номер телефона. Подробную инструкцию по восстановлению можно найти тут.
Как восстановить удаленный аккаунт в Роблокс
Что делать, если старый аккаунт был удален и его нужно вернуть, как в таком случае восстановить акк в Роблокс?
Ответ: никак! Удаленные аккаунты не подлежат восстановление. Ни на компьютере, ни на телефоне.
Как зайти в Роблокс, если забыл пароль
Чтобы зайти в аккаунт Роблокс, если забыл пароль, необходимо пройти процедуру восстановления, описанную тут.
Как сбросить пароль в Роблоксе
Чтобы сбросить пароль в Роблоксе нужно пройти процедуру, описанную вначале статьи.
Не нашли ответ? Тогда воспользуйтесь формой поиска:
Recovering your account if you lose your 2FA credentials
In this article
If you lose access to your two-factor authentication credentials, you can use your recovery codes, or another recovery option, to regain access to your account.
Warnings:
Using a two-factor authentication recovery code
Type your username and password to prompt authentication.
Warning: If you protect your personal account with two-factor authentication but do not know your password, you will not be able to follow these steps to recover your account. GitHub can send a password reset email to a verified address associated with your account. For more information, see «Updating your GitHub access credentials.»
Under «Having problems?», click Use a recovery code or request a reset.
Type one of your recovery codes, then click Verify.
Authenticating with a fallback number
If you lose access to your primary TOTP app or phone number, you can provide a two-factor authentication code sent to your fallback number to automatically regain access to your account.
Authenticating with a security key
If you configured two-factor authentication using a security key, you can use your security key as a secondary authentication method to automatically regain access to your account. For more information, see «Configuring two-factor authentication.»
Authenticating with a verified device, SSH token, or personal access token
If you know your password for GitHub.com but don’t have the two-factor authentication credentials or your two-factor authentication recovery codes, you can have a one-time password sent to your verified email address to begin the verification process and regain access to your account.
Note: For security reasons, regaining access to your account by authenticating with a one-time password can take up to three business days. GitHub will not review additional requests submitted during this time.
You can use your two-factor authentication credentials or two-factor authentication recovery codes to regain access to your account anytime during the 3-5 day waiting period.
Type your username and password to prompt authentication.
Warning: If you protect your personal account with two-factor authentication but do not know your password, you will not be able to follow these steps to recover your account. GitHub can send a password reset email to a verified address associated with your account. For more information, see «Updating your GitHub access credentials.»
Under «Having problems?», click Use a recovery code or request a reset.
To the right of «Locked out?», click Try recovering your account.
Click I understand, get started to request a reset of your authentication settings.
Click Send one-time password to send a one-time password to all eligible addresses associated with your account. Only verified emails are eligible for account recovery. If you’ve restricted password resets to your primary and/or backup addresses, these addresses are the only addresses eligible for account recovery.
Under «One-time password», type the temporary password from the recovery email GitHub sent.
Click Verify email address.
Choose an alternative verification factor.
A member of GitHub Support will review your request and email you within three business days. If your request is approved, you’ll receive a link to complete your account recovery process. If your request is denied, the email will include a way to contact support with any additional questions.
Help us make these docs great!
All GitHub docs are open source. See something that’s wrong or unclear? Submit a pull request.
Enter a previously saved recovery code
If you lose your code generation device (such as your mobile phone) and you need to disable two-factor authentication on your account, you have several options.
Use a saved recovery code
When you enabled two-factor authentication for your account, a series of recovery codes were generated. If you saved those codes somewhere safe, you may use one to sign in.
First, enter your username/email and password on the GitLab sign in page. When prompted for a two-factor code, enter one of the recovery codes you saved previously.
Note: Once a particular recovery code has been used, it cannot be used again. You may still use the other saved recovery codes at a later time.
Generate new recovery codes using SSH
It’s not uncommon for users to forget to save the recovery codes when enabling two-factor authentication. If you have an SSH key added to your GitLab account, you can generate a new set of recovery codes using SSH.
Next, go to the GitLab sign in page and enter your username/email and password. When prompted for a two-factor code, enter one of the recovery codes obtained from the command line output.
Ask a GitLab administrator to disable two-factor on your account
If the above two methods are not possible, you may ask a GitLab global administrator to disable two-factor authentication for your account. Please be aware that this will temporarily leave your account in a less secure state. You should sign in and re-enable two-factor authentication as soon as possible after the administrator disables it.
Two-factor authentication (FREE)
Two-factor authentication (2FA) provides an additional level of security to your GitLab account. For others to access your account, they would need your username and password and access to your second factor of authentication.
GitLab supports as a second factor of authentication:
If you set up a device, also set up a TOTP so you can still access your account if you lose the device.
Use personal access tokens with two-factor authentication
When 2FA is enabled, you can’t use your password to authenticate with Git over HTTPS or the GitLab API. You can use a personal access token instead.
Git Credential Manager
For Git over HTTPS, Git Credential Manager (GCM) offers an alternative to personal access tokens. By default, GCM authenticates using OAuth, opening GitLab in your web browser. The first time you authenticate, GitLab asks you to authorize the app. If you remain signed in to GitLab, subsequent authentication requires no interaction.
So you don’t need to reauthenticate on every push, GCM supports caching as well as a variety of platform-specific credential stores that persist between sessions. This feature is useful whether you use personal access tokens or OAuth.
GCM supports GitLab.com out the box. To use with self-managed GitLab, see GitLab support documentation.
Git Credential Manager is developed primarily by GitHub, Inc. It is an open-source project and is supported by the community.
Enable two-factor authentication
You can enable 2FA:
In GitLab 14.3 and later, your account email must be confirmed to enable 2FA.
Enable one-time password
To enable 2FA with a one-time password:
If you entered the correct pin, GitLab displays a list of recovery codes. Download them and keep them in a safe place.
Enable one-time password using FortiAuthenticator
You can use FortiAuthenticator as a one-time password (OTP) provider in GitLab. Users must:
You need a username and access token for FortiAuthenticator. The access_token shown below is the FortAuthenticator access key. To get the token, see the REST API Solution Guide at Fortinet Document Library. GitLab 13.5 has been tested with FortAuthenticator version 6.2.0.
Configure FortiAuthenticator in GitLab. On your GitLab server:
Open the configuration file.
For Omnibus GitLab:
For installations from source:
Add the provider configuration:
For Omnibus package:
For installations from source:
Save the configuration file.
Reconfigure (Omnibus GitLab) or restart (GitLab installed from source).
Enable one-time password using FortiToken Cloud
You can use FortiToken Cloud as a one-time password (OTP) provider in GitLab. Users must:
You need a client_id and client_secret to configure FortiToken Cloud. To get these, see the REST API Guide at Fortinet Document Library.
Configure FortiToken Cloud in GitLab. On your GitLab server:
Open the configuration file.
For Omnibus GitLab:
For installations from source:
Add the provider configuration:
For Omnibus package:
For installations from source:
Save the configuration file.
Reconfigure (Omnibus GitLab) or restart (GitLab installed from source).
Set up a U2F device
GitLab officially supports YubiKey U2F devices, but users have successfully used SoloKeys and Google Titan Security Key.
U2F is supported by the following desktop browsers:
Firefox 67+. For Firefox 47-66:
To set up 2FA with a U2F device:
A message displays indicating that your device was successfully set up. Select Register U2F Device to complete the process. Recovery codes are not generated for U2F devices.
Set up a WebAuthn device
To set up 2FA with a WebAuthn-compatible device:
A message displays indicating that your device was successfully set up. Recovery codes are not generated for WebAuthn devices.
Recovery codes
Introduced in GitLab 13.7, Copy codes and Print codes buttons.
Immediately after successfully enabling 2FA with a one-time password, you’re prompted to download a set of generated recovery codes. If you ever lose access to your one-time password authenticator, you can use one of these recovery codes to sign in to your account.
WARNING: Each code can be used only once to sign in to your account.
NOTE: Recovery codes are not generated for U2F or WebAuthn devices.
If you lose the recovery codes, or want to generate new ones, you can use either:
Regenerate two-factor authentication recovery codes
To regenerate 2FA recovery codes, you need access to a desktop browser:
NOTE: If you regenerate 2FA recovery codes, save them. You can’t use any previously created 2FA codes.
Sign in with two-factor authentication enabled
Signing in with 2FA enabled is only slightly different than the normal sign-in process. Enter your username and password and you’re presented with a second prompt, depending on which type of 2FA you’ve enabled.
Sign in using a one-time password
When asked, enter the pin from your one time password authenticator’s application or a recovery code to sign in.
Sign in using a U2F device
To sign in by using a U2F device:
A message displays indicating that your device responded to the authentication request, and you’re automatically signed in.
Sign in using a WebAuthn device
In supported browsers, you should be automatically prompted to activate your WebAuthn device (for example, by touching or pressing its button) after entering your credentials.
A message displays indicating that your device responded to the authentication request and you’re automatically signed in.
Disable two-factor authentication
This clears all your 2FA registrations, including mobile applications and U2F or WebAuthn devices.
Recovery options
If you don’t have access to your code generation device, you can recover access to your account:
Use a saved recovery code
To use a recovery code:
After you use a recovery code, you cannot re-use it. You can still use the other recovery codes you saved.
Generate new recovery codes using SSH
Users often forget to save their recovery codes when enabling 2FA. If you added an SSH key to your GitLab account, you can generate a new set of recovery codes with SSH:
On self-managed instances, replace gitlab.com in the command above with the GitLab server hostname ( gitlab.example.com ).
You are prompted to confirm that you want to generate new codes. This process invalidates previously-saved codes. For example:
Go to the GitLab sign-in page and enter your username or email, and password. When prompted for a two-factor code, enter one of the recovery codes obtained from the command-line output.
After signing in, immediately set up 2FA with a new device.
Have two-factor authentication disabled on your account (PREMIUM SAAS)
If other methods are unavailable, submit a support ticket to request a GitLab global administrator disable 2FA for your account:
Information for GitLab administrators (FREE SELF)
Take care that 2FA keeps working after restoring a GitLab backup.
To ensure 2FA authorizes correctly with a time-based one time passwords (TOTP) server, synchronize your GitLab server’s time using a service like NTP. Otherwise, authorization can always fail because of time differences.
The GitLab U2F and WebAuthn implementation does not work when the GitLab instance is accessed from multiple hostnames or FQDNs. Each U2F or WebAuthn registration is linked to the current hostname at the time of registration, and cannot be used for other hostnames or FQDNs.
For example, if a user is trying to access a GitLab instance from first.host.xyz and second.host.xyz :
To enforce 2FA at the system or group levels see, Enforce two-factor authentication.
Troubleshooting
If you receive an invalid pin code error, this can indicate that there is a time sync issue between the authentication application and the GitLab instance itself. To avoid the time sync issue, enable time synchronization in the device that generates the codes. For example:
Two-factor authentication (FREE)
Two-factor authentication (2FA) provides an additional level of security to your GitLab account. For others to access your account, they would need your username and password and access to your second factor of authentication.
GitLab supports as a second factor of authentication:
If you set up a device, also set up a TOTP so you can still access your account if you lose the device.
Use personal access tokens with two-factor authentication
When 2FA is enabled, you can’t use your password to authenticate with Git over HTTPS or the GitLab API. You can use a personal access token instead.
Git Credential Manager
For Git over HTTPS, Git Credential Manager (GCM) offers an alternative to personal access tokens. By default, GCM authenticates using OAuth, opening GitLab in your web browser. The first time you authenticate, GitLab asks you to authorize the app. If you remain signed in to GitLab, subsequent authentication requires no interaction.
So you don’t need to reauthenticate on every push, GCM supports caching as well as a variety of platform-specific credential stores that persist between sessions. This feature is useful whether you use personal access tokens or OAuth.
GCM supports GitLab.com out the box. To use with self-managed GitLab, see GitLab support documentation.
Git Credential Manager is developed primarily by GitHub, Inc. It is an open-source project and is supported by the community.
Enable two-factor authentication
You can enable 2FA:
In GitLab 14.3 and later, your account email must be confirmed to enable 2FA.
Enable one-time password
To enable 2FA with a one-time password:
If you entered the correct pin, GitLab displays a list of recovery codes. Download them and keep them in a safe place.
Enable one-time password using FortiAuthenticator
You can use FortiAuthenticator as a one-time password (OTP) provider in GitLab. Users must:
You need a username and access token for FortiAuthenticator. The access_token shown below is the FortAuthenticator access key. To get the token, see the REST API Solution Guide at Fortinet Document Library. GitLab 13.5 has been tested with FortAuthenticator version 6.2.0.
Configure FortiAuthenticator in GitLab. On your GitLab server:
Open the configuration file.
For Omnibus GitLab:
For installations from source:
Add the provider configuration:
For Omnibus package:
For installations from source:
Save the configuration file.
Reconfigure (Omnibus GitLab) or restart (GitLab installed from source).
Enable one-time password using FortiToken Cloud
You can use FortiToken Cloud as a one-time password (OTP) provider in GitLab. Users must:
You need a client_id and client_secret to configure FortiToken Cloud. To get these, see the REST API Guide at Fortinet Document Library.
Configure FortiToken Cloud in GitLab. On your GitLab server:
Open the configuration file.
For Omnibus GitLab:
For installations from source:
Add the provider configuration:
For Omnibus package:
For installations from source:
Save the configuration file.
Reconfigure (Omnibus GitLab) or restart (GitLab installed from source).
Set up a U2F device
GitLab officially supports YubiKey U2F devices, but users have successfully used SoloKeys and Google Titan Security Key.
U2F is supported by the following desktop browsers:
Firefox 67+. For Firefox 47-66:
To set up 2FA with a U2F device:
A message displays indicating that your device was successfully set up. Select Register U2F Device to complete the process. Recovery codes are not generated for U2F devices.
Set up a WebAuthn device
To set up 2FA with a WebAuthn-compatible device:
A message displays indicating that your device was successfully set up. Recovery codes are not generated for WebAuthn devices.
Recovery codes
Introduced in GitLab 13.7, Copy codes and Print codes buttons.
Immediately after successfully enabling 2FA with a one-time password, you’re prompted to download a set of generated recovery codes. If you ever lose access to your one-time password authenticator, you can use one of these recovery codes to sign in to your account.
WARNING: Each code can be used only once to sign in to your account.
NOTE: Recovery codes are not generated for U2F or WebAuthn devices.
If you lose the recovery codes, or want to generate new ones, you can use either:
Regenerate two-factor authentication recovery codes
To regenerate 2FA recovery codes, you need access to a desktop browser:
NOTE: If you regenerate 2FA recovery codes, save them. You can’t use any previously created 2FA codes.
Sign in with two-factor authentication enabled
Signing in with 2FA enabled is only slightly different than the normal sign-in process. Enter your username and password and you’re presented with a second prompt, depending on which type of 2FA you’ve enabled.
Sign in using a one-time password
When asked, enter the pin from your one time password authenticator’s application or a recovery code to sign in.
Sign in using a U2F device
To sign in by using a U2F device:
A message displays indicating that your device responded to the authentication request, and you’re automatically signed in.
Sign in using a WebAuthn device
In supported browsers, you should be automatically prompted to activate your WebAuthn device (for example, by touching or pressing its button) after entering your credentials.
A message displays indicating that your device responded to the authentication request and you’re automatically signed in.
Disable two-factor authentication
This clears all your 2FA registrations, including mobile applications and U2F or WebAuthn devices.
Recovery options
If you don’t have access to your code generation device, you can recover access to your account:
Use a saved recovery code
To use a recovery code:
After you use a recovery code, you cannot re-use it. You can still use the other recovery codes you saved.
Generate new recovery codes using SSH
Users often forget to save their recovery codes when enabling 2FA. If you added an SSH key to your GitLab account, you can generate a new set of recovery codes with SSH:
On self-managed instances, replace gitlab.com in the command above with the GitLab server hostname ( gitlab.example.com ).
You are prompted to confirm that you want to generate new codes. This process invalidates previously-saved codes. For example:
Go to the GitLab sign-in page and enter your username or email, and password. When prompted for a two-factor code, enter one of the recovery codes obtained from the command-line output.
After signing in, immediately set up 2FA with a new device.
Have two-factor authentication disabled on your account (PREMIUM SAAS)
If other methods are unavailable, submit a support ticket to request a GitLab global administrator disable 2FA for your account:
Information for GitLab administrators (FREE SELF)
Take care that 2FA keeps working after restoring a GitLab backup.
To ensure 2FA authorizes correctly with a time-based one time passwords (TOTP) server, synchronize your GitLab server’s time using a service like NTP. Otherwise, authorization can always fail because of time differences.
The GitLab U2F and WebAuthn implementation does not work when the GitLab instance is accessed from multiple hostnames or FQDNs. Each U2F or WebAuthn registration is linked to the current hostname at the time of registration, and cannot be used for other hostnames or FQDNs.
For example, if a user is trying to access a GitLab instance from first.host.xyz and second.host.xyz :
To enforce 2FA at the system or group levels see, Enforce two-factor authentication.
Troubleshooting
If you receive an invalid pin code error, this can indicate that there is a time sync issue between the authentication application and the GitLab instance itself. To avoid the time sync issue, enable time synchronization in the device that generates the codes. For example:
Как восстановить свой аккаунт roblox запрещен в 2022 году
Как восстановить свою учетную запись Roblox без электронной почты или номера телефона Вы забыли свой пароль Roblox, но потеряли доступ к своей электронной почте и номеру телефона? Если у вас
Как восстановить свою учетную запись Roblox без электронной почты или номера телефона
Вы забыли свой пароль Roblox, но потеряли доступ к своей электронной почте и номеру телефона?
Если у вас все еще есть доступ к электронной почте и номеру телефона, вы можете сбросить пароль, нажав на «Забыли пароль или имя пользователя?» ссылка.
Ссылка находится на странице входа Роблокса.
Затем вы можете использовать свой адрес электронной почты или номер телефона, чтобы сбросить пароль.
Однако, если у вас нет к ним доступа, вы не можете использовать этот метод.
Вместо этого вам придется обратитесь в службу поддержки Roblox для оказания помощи.
В противном случае вы не сможете восстановить свою учетную запись Roblox и сбросить пароль.
В этом руководстве вы узнаете, как восстановить свою учетную запись Roblox без адреса электронной почты или номера телефона.
Пошаговое руководство по вопросу восстановления учетной записи Roblox (2022 г.)
Как сбросить и изменить пароль Roblox с помощью электронной почты и номера телефона?
1. Как сбросить пароль с помощью электронной почты Roblox?
2. Как изменить пароль с помощью номера телефона?
После всего этого вы сможете войти в свой аккаунт Roblox. Помните, что пароль нужно менять часто, чтобы сохранить аккаунт в безопасности.
3. Восстановление аккаунта Roblox без электронной почты или номера телефона
убедитесь, что вы точно знаете, какой email вы использовали для создания аккаунта.
4. Как вернуть аккаунт Roblox без электронной почты или номера телефона?
Восстановление учетной записи Roblox без электронной почты или номер телефона
Если вы считаете, что ваша учетная запись Roblox была взломана, и вы хотите восстановить ее без доступа к электронной почте или номеру телефона, есть способ сделать это. Для этого убедитесь, что вы точно знаете, какой адрес электронной почты вы использовали для создания учетной записи.
Как получить учетную запись Roblox Вернуться без электронной почты или номера телефона?
Для получения дополнительных советов и кодов посетите наш раздел Roblox на Guideer.
Как вернуть аккаунт в Роблокс, если нет почты и телефона
Что делать, если профиль в Roblox забанли или удалили
Если геймера забанили и страничку удалили несправедливо, вернуть доступ к ней можно только в том случае, если вы не совершали неправомерных действий в игре. Для этого следует обратиться в службу поддержки и заполнить специальную форму. Здесь вводится такая информация как имя, адрес электронной почты, а также описание ситуации.
В ближайшее время письмо будет рассмотрено и принято решение. Апелляция будет в пользу игрока только в том случае, если он не нарушал правил Roblox. В противном случае решение будет вынесено не в пользу геймера.
Защитите свою учетную запись Roblox
Перейти к вашей Настройки аккаунта Roblox и нажмите » Безопасность«.
Доступны несколько вариантов:
Если все эти шаги будут выполнены, ваша учетная запись будет в безопасности, и у вас не возникнет никаких проблем. Удачной вам игры, не забудьте поделиться своим опытом в комментариях!
Почему не работает Roblox? Что за сбой 10 мая?
На большей части России сегодня 10 май 2022 не работает Роблокс. Сбои зарегистрированы в следующих регионах страны:
Add a Recovery Email Address to Your Microsoft Account
Don’t be locked out of your Outlook.com or Hotmail email account
What to Know
This article explains how to add an alternate email address on Outlook.com in case you need to recover your Microsoft Account.
How to Add a Recovery Email Address to Outlook.com
Including a recovery email address is easy to do:
Log on to your email account at Outlook.com in a browser.
Select your avatar or initials on the far right side of the menu bar to open your My Account screen.
Press View account.
Select the Security tab at the top of the My Account screen.
Choose Update Info in the Update your security info area.
Verify your identity, if asked to do so. For example, you may be asked to enter a code sent to your phone number, if you previously entered a recovery phone number.
Select Add security info.
Choose An alternate email address from the first drop-down menu.
Enter an email address to serve as your recovery email address for your Microsoft account.
Press Next. Microsoft will email the new recovery address with a code.
Enter the code from the email in the Code area of the Add security info window.
Press Next to save the changes and add the recovery email address to your Microsoft account.
Verify that the email password recovery address was added by returning to the Update your security info section. Your Microsoft email account should also receive an email that says you updated your security information.
You can add multiple recovery addresses and phone numbers by repeating these steps. When you want to reset your password, you can choose which alternate email address or phone number the code should be sent to.
Why Do You Need a Recovery Email Address?
Outlook.com is home to your Outlook, Hotmail, and other Microsoft email accounts. Your password is the key to all your email there. If you forget your password though, you’ll need to recover your account and create a new one. To simplify the password change, add a secondary email address or phone number to Outlook.com, so that you can reset your password and access your account while keeping your account secure.
A recovery email address makes it easy to change your password and more difficult for your account to be hacked. Microsoft sends a code to an alternate email address to validate you are who you say you are. You enter the code in a field and then you are allowed to make changes to your account—including a new password.
Select a Strong Password
Microsoft encourages its email users to use a strong password with their Microsoft email address. Microsoft’s recommendations include:
Also, Microsoft recommends turning on two-step verification to make it difficult for someone else to sign in to your Microsoft account. With two-step verification activated, whenever you sign in on a new device or from a different location, Microsoft sends a security code that you must enter on the sign-in page.
Как разблокировать аккаунт после 5 неудачных попыток входа
Как разблокировать аккаунт после 5 неудачных попыток входа
Наверное, каждый сталкивался с ошибкой при попытке авторизации с не валидными данными, которая по-английски звучит так
Sorry, there have been more than 5 failed login attempts for this account. It is temporarily blocked. Try again later or request a new password.
Аккаунт временно заблокирован по причине более чем 5 неудачных попыток входа. Попробуйте войти позже, или запросите новый пароль.
Это простая самооборона Друпала, которая активируется после 5 (по умолчанию) попыток входа. Таким образом, система не позволяет злоумышленникам забрутофорсить (англ. brute force. Cм. Полный перебор) сайт. Работает она достаточно просто: во время каждой авторизации, Друпал сохраняет ip-адрес пользователя, запоминая при этом, точную дату события и дату окончания «срока годности» попытки.
Вот некоторые нюансы:
Вот еще один интересный факт:
Вы можете имя пользователя указать верно, но при этом 5 раз ошибиться с паролем. В таком случае, попытки авторизации будут запрещены на 6 часов. При этом, через 60 минут можно будет повторить попытку входа, но с другого ip-адреса.
Что касается простых смертных — мы разобрались. Администраторы, же или программисты могут сталкиваться с этой проблемой чаще, т.к. им хлеб в рот не клади, дай только что-нибудь сломать. К счастью, для тех у кого есть доступ к Драшу или напрямую к базе могут обойтись без сброса пароля или часового ожидания. Нужно просто почистить таблицу flood
. Вот восемь способов это сделать.
Проблемы, ошибки, неточности в тексте пишите в комментах.
Microsoft Account Recovery Code
What and why with instructions included
A Microsoft account recovery code
A Microsoft recovery code — more correctly, a recovery code for a Microsoft account — is a safety net. It’s a huge safety net, in fact. If you haven’t already done so, I strongly suggest you create one now.
It didn’t dawn on me until recently that these codes are very precious. Having one may be the ultimate proof of Microsoft account ownership.
Microsoft Account recovery codes
A Microsoft account recovery code is a magic number proving you’re authorized to access your account. Generate one via your Microsoft account’s security settings before you need it, and keep it in a safe place. If you ever get locked out it may be the only way you’ll be able to regain access to your account.
What a recovery code is
A recovery code is nothing more than a long, complex number. In fact, it looks very much like an old-style Microsoft product key.
Here’s an example: A Microsoft account recovery code. (Click for larger image.)
It’s a number that’s generated and assigned to you on request.
Possession is 99.999% of the law
I’ll put it differently: being able to provide the code when requested may be enough to regain access to your Microsoft account should you ever forget your password, be unable to recover it, or get locked out of the account (perhaps when travelling).
A recovery code, then, is very valuable. Once you get one, you need to keep it safe and secure. If you store it digitally, as I do, that means you encrypt it. If you store it physically, perhaps by printing it out, then you save that paper in a very safe and secure location.
There can be only one
If you note the wording of the dialog above closely, you’ll see that it says, “If you previously had a recovery code, it is no longer valid.”
Each time you generate a code for an account, it replaces the previous one. 2 Should you get a new one, make sure you replace any previous copies you’ve kept.
My understanding is that a code can be used only once. Make sure to get a new one should you ever use yours.
Get it before you need it
A Microsoft account recovery code is useful only if it’s been created before you need it. You need to be able to log in to your account to create it.
If you can’t log in, you can’t create a code. Without a code, you’ll need to find some other way to log in or recover your account.
How to get a Microsoft recovery code
While signed in to your Microsoft account, click on your profile icon (or initials, if you haven’t set a profile image) in the upper right, and then click on My account.
Microsoft “My account” link (via Outlook.com).
You may then need to scroll down to click on Update underneath “Update your security info”.
Update your security info.
Next you’ll reconfirm either your password, PIN, or other authentication method to confirm you’re authorized to make changes.
Look for “Advanced security options” and click Get started.
Advanced Security Options
You’ll then be presented with your new code. A Microsoft account recovery code. (Click for larger image.)
How to save your code
As I mentioned above, this code needs to be saved so it’s available to you when you need it, but it also needs to be saved securely so it doesn’t fall into the hands of someone who could use it to hack
Most importantly, make sure you have access when you need it.
One common scenario where a Microsoft account recovery code comes in handy is if you find yourself locked out because you’re traveling. Possession of the recovery code should prove that you are who you say you are, even if you’re in another country, and should allow you back into your account.
If you get hacked
If someone else gains unauthorized access to your account, they could change the recovery code, and the one you have will no longer work. Not all hackers do this, but some are savvy enough to change all of your recovery information, including this code.
Then you’ll have to follow account recovery instructions to manually regain access to your account, and hope that the process works. (Sadly, it’s not uncommon that it does not.)
And, of course, make sure that you’re always backing up your email, just in case.
Hopefully you’ll never need your recovery code, but if you found this article helpful, you’ll love Confident Computing! My weekly email newsletter is full of articles that help you solve problems, stay safe, and increase your confidence with technology.
Related Questions
How do I find my Microsoft recovery code?
You cannot find your Microsoft recovery code if you have not created it ahead of time. You must create it before you need it and store it in a safe place. Then, when the time comes that you do need it, you’ll find your Microsoft recovery code in the secure place you placed it.
How can I recover my Microsoft account without email?
In general, you cannot recover a Microsoft account for which you do not know the email address. The email address uniquely identifies each account and is fundamental to both use and recovery. If for some reason, you cannot access your Microsoft account you can create a new, temporary one, that can be used to communicate with Microsoft as part of their account recovery process for your lost account.
Why did I get Microsoft verification code?
If you’re attempting to sign in you may get a Microsoft verification code via SMS [Short Message Service]
Recover Your Microsoft Account Later by Setting Up a Recovery Code NOW – Step by Step Instructions
Here at Ask Leo!, I hear from people with lost, hacked and inaccessible accounts daily.
Nowhere does this seem to happen more frequently than with Hotmail and Outlook.com accounts (now known simply as Microsoft accounts).
Given the increased importance of Microsoft accounts for everything from email to cloud
Microsoft has instituted a fairly obscure security measure that can help you regain access to your account should you lose it: the recovery code. The only “catch” is that you have to set it up before you need it.
So let’s set it up right now.
Setting Up a Recovery Code
A recovery code can get you back in to your Microsoft account when other techniques, like alternate email addresses and phones, cannot. Set one up before you need it by signing into your account, and visiting More security settings. Save the security code in a secure location such that it’s available whenever and wherever you might need it to sign in to your account later.
Getting a recovery code
Recovery codes are generated by Microsoft, and must be retrieved before you need them. Once you have a recovery code, you keep it in a safe place until you need it.
To get a recovery code, begin by logging into your account 1 and clicking on your avatar/picture (or the default placeholder) in the upper right. Then click on View account.
Depending on the width of your display window, you’ll either have a full menu bar across the top, or you’ll need to click a small down-arrow next to the word Account on the menu bar. In either case, click on Security & privacy.
On the resulting page, click on More security settings.
At this point, you may be asked to confirm your identity again, using a text or phone message or alternate email address. This added layer of security is important, as it confirms that you are indeed the person who owns the account, and that you are the person who can rightfully create and hold the account recovery code.
Once you’ve passed this additional layer of security, you’ll land on the “Security settings” page.
Scroll down and look for the section labeled “Recovery code”.
Click on Get recovery code (or Replace recovery code if you already have one).
Your new recovery code is displayed. The code is lengthy, and actually looks a little like a product key. Any previous recovery code you may have had for this account is no longer valid.
Storing your recovery code
Your recovery code is important, but also sensitive. It should not be shared with anyone, and must be stored securely. Anyone with the recovery code could be able to hijack your account.
I save it to a file (so I can copy/paste it when needed, instead of having to type it in) and keep that file in an encrypted location.
Using your recovery code
There are various scenarios in which you can use your recovery code to regain access to your Microsoft account.
As we saw in How do I get into my Hotmail/Outlook.com account if I don’t have the recovery phone or email any more?, Microsoft may ask you if you have one as one of your account recovery options.
If you do have one, it’s kind of like a free pass to regaining control of your account.
And if you’ve followed the instructions above, you now have one.
Hopefully you’ll never need it, but if you found this article helpful, you’ll love Confident Computing! My weekly email newsletter is full of articles that help you solve problems, stay safe, and increase your confidence with technology.
Podcast audio
Note: This article does get updated from time to time, as Microsoft changes the interface to access your Microsoft Security Settings (though there’s typically a delay).
Footnotes & references
1 : You must be able to log in to your account. If you cannot log in to your account, you cannot generate this type of recovery code. This is why I stress that you need to set this up before you need it. Posted: October 21, 2016 in: Outlook.com
This is an update to an article originally posted May 8, 2015
Shortlink: https://askleo.com/16142
Tagged: account recovery, account security, recovery code
Leo Who?
120 comments on “Recover Your Microsoft Account Later by Setting Up a Recovery Code NOW – Step by Step Instructions”
You could also keep it as a secure note in a password manager. LastPass has such facility, I assume that Roboform, Keepass and others have something similar.
Thanks for this tip Leo. I found that one of the best places to store this code and other important bits of information is in RoboForm’s “Safe Notes”. They are always to hand, they are backed up in RoboForm’s “cloud” and you can sync them with your RoboForm on portable devices too.
In your browser, go to http://www.outlook.com and you’ll be presented with the login interface. This is where Leo is getting his screenshots. 🙂
Took me a while too. I normally only use my Microsoft account for OneDrive and account management isn’t under options in the gear menu there. However, by selecting my name to the right of the gear I found Account Settings. There are quite a few other changes too. The code isn’t on-screen now. You can arrange how to get it.
Well, they sent me a 7 digit number, but that was just to verify it was me. Then I found the Recovery Code setting as above, so sorry for jumping in too quickly.
Dear Gabe, my problem was that I never acces to http://www.hotmail.com, now I hav e my code, this is the first time I open http://www.hotmail.com
Going to hotmail.com should automatically redirect you to Outlook.com where you can login with your account credentials.
To save the code in a SAFE place, print it on paper and file it in a place known only to you with a note on a index card placed inside the computer as a key to finding the code print out in case you forgot where you put it and tell a trusted friend what you did and why in case your memory needs a jog to find the code if you forget. Don’t rely on a computer to recover your security codes or email addresses or other sensitive info. Crashes can be disastrous.
To verify that this is your email address, complete the hidden part and click “Send code” to receive your code.
so i can’t know the email i have that broplem. my email is blocket is
One issue you may be having is from posting your email address in public forums. That increases your level of spam. Here is an article that you may find informative: http://askleo.com/giving-away-our-privacy/
Your ability to remember what you set it to is part of what “proves” you are the rightful owner. If you can’t remember it, then you can’t prove that.
Hi Leo,
I’m not happy with keeping codes/product keys. I prefer to do it only out of compulsion. The reason is that after sometime, I usually forget where I’ve kept it. This is the reason that I’m scared whenever I need to secure anything. Now, when a code is required after 5 years, what is my position?
I’ve provided alternate phone numbers and other information for recovery to all my mail accounts, including for hotmail. Is it sufficient?
I personally use 3 recovery emails in addition to my phone number for my important accounts. This way I’m protected in case I lose one of my recovery accounts or am in an area where I can’t get phone verification. As for product keys and codes, I have an envelope at home where I keep them all. In addition I keep them encrypted in a DropBox folder and backed up on my external hard drive and additional cloud storage. Overkill? Maybe, but it’s simple and inexpensive and more than worth the effort.
Recovery my fb account
I can,t get into my facebook page on my new mobile phone..I have tried all my passwords it won,t take any of them.. Badly disappointed…
sir how can i recover my lost account and password pls help me:(:(
Another excellent article, thanks Leo!
I have a question, before I set this all up.
My ISP provides us with multiple email addresses. Is it safe to use one of the other addresses as an alternate for each of the addresses we use, or do we need addresses from totally different entity?
It should be OK to use your ISP’s email address as a recovery address. I personally have four email addresses and three phone numbers for recovery. The more the merrier.
This recovery code is in addition to all that. You should be able to use this Recovery Code anywhere in the world even if your phones don’t work and you’ve lost access to your recovery email addresses. I have mine in an encrypted Dropbox folder which I can access from anywhere. If you uses that, don’t forget that password.
I’m thinking that people who don’t see that gear icon…..and I’m one of them….will just stop right there, thinking this isn’t for them. I’m not sure where that gear icon is, myself, so I stopped right there.
Dell, I believe that you will see the “gear” only after you have logged into Outlook.com with your Microsoft/Live/Outlook/etc account.
I’m confused. You imply that you are using Outlook.com and yet you have no gear icon?
Most interesting and I definitely will get that recovery code thanks Leo. A question on the subject of getting from both Hotmail and Gmail messages that they noticed unusual activities and therefore block access to the account. This happens when I use a VPN such as Hotspot, how can I avoid getting those messages? Its always a lot of time loss to get through their procedures. Maybe you have a solution?
I have no solution. The problem that Hotmail and Gmail are battling is absolutely huge – account theft is rampant, it really is. These measures are their way of attempting to prevent that from happening.
Thank you for the directions. I now have a Recovery Code. I keep a list of all my accounts, sitenames, URLs, usernames, passwords ( 290 as of today) for work and home in an Excel spreadsheet. I change my passwords at least once a year. More for work because we have to every 4 months. The spreadsheet is encrypted with a serious password. I have a printout stored in my bankbox in case of my death or a disaster. What do you think?
Great article. I did generate a recovery code a while back. In fact, at some time I replaced it (generated a new one). I think I know which one is which. Is there any way to verify or test that I am using the right one? I only see a button to generate another new one.
No. You can only replace it.
Like Pablo, I can’t get to my account. Outlook.com does not recognize my email and/or my administrator password and the gear icon does not give me any of the options in your description.
It’s not your administrator password it wants – you login to outlook.com with your outlook.com email address and your outlook.com password.
I followed your instructions where I was eventually taken to a page that said
Help us protect your account.
Before you can access sensitive info, you need to verify your identity with a security code. How would you like to receive your code?
To verify that this is your email address, complete the hidden part and click “Send code” to receive your code.
I entered the ***** part and was told “That doesn’t match the alternate email associated with your account. The correct email starts with “rj”. Clearly, one portion of the instructions says to enter only the hidden (*****) part and the other says to enter “rj” PLUS the hidden part. I find this typical of Microsoft. Details are often not checked leading to errors and confusion. As a former computer professional I know that if you haven’t verified that a process works (especially a recovery process) then you don’t have a recovery process. In this case this was a mistake that was easily correccted, but this type of error should never have made it to a production (online) environment. Microsoft has once again dropped the (very important) ball.
I have not used my Hotmail account in ages and don’t plan to. It’s not clear what other uses this recovery code is good for. Please illuminate me.
None… and it also would be of no use to someone who does not have a Hotmail (outlook.com) account.
Any Microsoft service for which you use that Hotmail address to login to. If you don’t use any, then you don’t need it.
Following your route does NOT take me to where I can set a RECOVERY CODE.
It takes me to where if necessary I would enter a SECURITY CODE which I know from bitter personal experience, many times, is discontinued in a very short space of time —– so quickly that it has often expired before I can enter it into my Tablet, so I have had to repeat the exercise several times until with luck I manage to beat the system and enter it before it expires!
So, given that I end up in a different place to the one you describe, where do I find the RECOVERY CODE page? I will start doing a search for it now!
The security code is a step on the way. In other words if you are asked for it you need to enter it before your proceed. This confirms that you are the authorized account owner. Once you enter the security code you’ll be taken to the correct place.
I like this idea and will try again later, but the first three attempts failed. It wants to pair with a smart phone, and believe it or not, some of us don’t have one. It might not work with an old flip p;hone, at least I can’t get it to work.
I have just had a long and fruitless Chat with a Microsoft advisor who insisted there was no such thing as a Recovery code —- he kept confusing it with the Product ID and then with activation and then the very temporary Security Code (which I have used many times when resetting my Microsoft account password>. Here is a directly copied quote:
‘Recovery key and product key is the same.
Actually no such thing recovery key, we from Microsoft called it as Product key.
You seeking help where you can find a recovery or product to store for future use.’ And so on. I thought you might be interested.
Since Microsoft doesn’t offer support for their email accounts, he wouldn’t be expected to give any advice on it. Therefore there’s no reason for him to know about it.
They seem to have accounts and products confused. There’s no such thing as a recovery code for a product (like Windows or Office). Make sure they understand that you’re talking about an outlook.com account.
I’m assuming that this is not the thing to do if you are using WIN XP SP 3 32 bit.
Also, I am using it on an aged desktop computer, no gearbox anywhere for me, except on Firefox….no-one mentioned a Browser, so I guess that isn’t the one you are talking about,
In Microsoft Office Outlook I did find a button that asked, “do I want a Digital ID?’
It appears this is so one can sign documents by proving who you are?
My question is, is this for me or not? and if not, why not? and, if not is there an alternative?
Good idea, great article….but mightily confused, as usual…(sorry, novice here).
Peace & Love
Sylvia
This should work on any OS including XP, MacOS, Linux or any phone or tablet OS. This is all done on the website and has nothing to do with which OS or browser you use.
Unless you know what a digital ID is, you probably don’t need one. You would need to send a copy of the public key to your recipients for them to verify your digital signature.
Microsoft Office Outlook is in no way related to Outlook.com. This article is all about your Microsoft account accessed via Outlook.com. What OS you are using has no bearing – if you have a Microsoft account online it applies.
Thanks for that, Leo. The only slight problem I had with following your instructions was that I couldn’t find a “More security settings” link. However in the same place was “Managed advanced security”, which took me to the right page.
This was extremely helpful. Hotmail/MSN/Outlook did not, to the best of my knowledge, have this in their help area. Yea! I will be able to access email while traveling. Thanks Leo.
My question is when they wanted me to verify my identity with a security code. They wanted to know how to send my code and it wanted me to fill in my email address to get the code. My problem is I tried this several times but I never get a code to my email. How can I get a code when it doesn’t come to my email?
Was it an email address you entered as a recovery address? Otherwise they wouldn’t be able to send it. If they sent it to addresses not registered with that account, a hacker could steal the account.
ok; I got my code; but I’m confused about this. I use outlook on my computer without ever logging into anywhere. I use RCN for my computer access (high speed cable modem; it’s like Comcast; but a competitor in my area) and so I think my emails come through the RCN server technically and arrive into my outlook inbox.
so would this article apply to me? or is this only if you log in and use outlook ‘in the cloud’? I’m so confused (insert googly eyes here which I don’t know how to do) : )
Outlook – the program from Microsoft Office that runs on your PC – is not not not the same as outlook.com. Your Microsoft account is an email account that uses a Microsoft domain like @hotmail.com, @live.com, @msn.com and so on, or a different email account that you have somehow registered with Microsoft as your Microsoft account to access Microsoft online services.
oh! LOL; I guess that’s why we pay you the big bucks ; )
I’m back at outlook 101.
Check your spam folder.
Leo, You said to get a recovery code for my Microsoft account after you said to get it for Hotmail or Outlook which you then stated are Microsoft accounts.
I’m confused once again.
Sounds like you want EVERYONE with a Windows machine to do this recovery code thing.
But, I don’t use Hotmail or Outlook. I use Windows Live Mail which is also a Microsoft product (I think)
So are you saying that I should be able to find my way to getting this code with WLM or what because I can’t figure out how to do that with your instructions.
Outlook.com, Hotmail, msn.com and Live.com accounts are all Microsoft accounts. They’re all accessed through the outlook.com webmail interface. All of them should be able to be protected with a recovery code in the same manner as described in the article. This wouldn’t work with other email service providers (ESP) on a Windows machine unless that ESP provided a similar service.
Other Microsoft type accounts that I use and need a recovery code are: Office 365 and OneDrive. I think the one Microsoft account (login.live.com) that uses my email as account number, covers all my subaccounts and subscriptions. And I think the one recovery code I acquired will work with all of them. My only problem is finding out how to verify the recovery code I wrote down was the most current. I can’t find a verify button.
There is no verify. You can only create a new one and replace your old one. If you login to all those other services with the same email and password, then they are all the same, single, Microsoft account and the one recovery code would apply.
Your machine login is not neccesarily a online account and it is not a “microsoft” account. Those accounts are local to your machine.
If you have an email address with Microsoft – like @hotmail.com or @live.com or @msn.com or you have registered your other email address with a Microsoft online service then those are Microsoft accounts.
Microsoft has further confused this with Windows 8 and on which allows you to set up your local machine so that you can login to it using your online account. Unless you login to your PC with an email address then this is NOT you.
Leo, this inspired me to create a recovery code. Problem is, my screen looks nothing like your screen captures. I have windows 8.1 and there is no gear icon. There is, on the dropdown under my login name, a list of options for Profile, Order History, Return History, Digital Content, and Payment, plus an item that says “looking for Microsoft Account Settings?” and when I click that it takes me to generic support for Windows. Not very helpful. I poked around and see no links for security. The Profile link only allows me to edit my name and email address.
Can you confirm that you are a) logged into Outlook.com, and b) looking at the outlook.com inbox when you don’t see a gear icon?
I use W8.1 and the Mail App does not have the gear icon. Like all such apps, the user is restricted as to what they can configure. The use of a browser on the desktop, not the ‘modern’ interface, should access outlook.com and show the gear icon.
My wife’s hotmail was blocked when we went on holiday to France from our UK home (both in EU countries). I used the Recovery Code issued by Microsoft last year – but it failed! I have eventually managed, after spending 3 days of our holiday, to get it working again. But this is so unnecessary and may be considered as being illegal as in the EU we have unrestricted movement across border within the EU, same as US citizens do between states.
I gather that the way the MS system works is to use a list of recognised devices for your account – but how do we add a new device to that list?
Likewise, it seems they use the IP address to determine which country you’re in and perhaps a rough location too (rough because that can be several hundred miles out if the ISP uses a randomised list as some do). Seems like a typical MS approach by not securing the real problem but making users life unnecessarily frought just because they take a holiday!
I don’t believe companies are required to give that kind of access between countries in the EU. This is a security issue for MS, and they even sometimes block access in different areas in the US. I have half a dozen recovery emails for my Hotmail account. Not that I need so many, but I usually add another one when I need to give instructions to people on how to do it, so I take the opportunity to add a new address each time :). One tip is to use an alternative email address which doesn’t have that kind of security in place as you can lock yourself into a verification loop when your alternate email provider send your verification code to your Hotmail address :(.
On my Windows 8.1 laptop, there is a Microsoft Store app that wants a MS account to be setup in order to down;load any app on the store.
Does this code recovery article apply to that account as well?
That is a Microsoft account, so yes this article applies.
When I logged in to set up a Recovery Code a message unexpectedly indicated my Microsoft account was “temporarily blocked” (no idea why b/c I’ve never had a problem with the account or access to it). So I opted to get a reset code by text to my phone. Nothing had arrived after 5 minutes so I tried again. After another 5 minutes I opted to have them call me (a robo call, I assume) with the code. But the MS site indicated that exceeded my allowed number of attempts (apparently just two). Moments later two texts arrived in quick succession, with two different codes. Figuring the last one was still good I went back to log in but found there is no way to get to the enter code page without going through the text/phone call routne which, of course, it refused to allow. Grrrr! For anyone in the same blocked status just be patient after requesting a code…wait ’till Miami freezes over if that’s how long it takes. Good luck setting up a Recovery Code.
I followed your directions and found that I already had a recovery code, since it said “replace” (when I got to that spot). News to me…!! Anyways, I am confused after reading all the comments above. What are all these “accounts” and “emails” – Hotmail, live, outlook, msn, etc.. I see that they are all Microsoft accounts, but I thought I only had the emails that I normally use – the one that I get my internet service from, and (2) free accounts, used for different purposes.
OK, so then I went to outlook.com and 2 of those accounts are listed on the left and the emails in the inbox are so old, they’ve long been deleted from the actual account from which they came… Can you explain this system and how it works? Thanks!
One other question – what apps need passwords? I got the following in an email just now and I don’t understand what to do – maybe I don’t use any apps?
“App passwords need to be updated
You changed your password recently. Since you turned on two-step verification for the Microsoft account ( deleted ), you need to create new app passwords for any apps or devices that don’t support two-step verification. Any existing app passwords will no longer work. “
Not sure, but it sounds like you turned on two-step verification for your email account. If you pick up that email using a phone or table, even a computer, then those are probably the apps the message is telling you about.
You apparently have two-step verification turned on. App passwords are used when you have a specific app (or application) that needs a password but can’t do two-step. An example might be a desktop email program.
WHEN I DID THE PROCEDURE DESCRIBED IN THIS TUTORIAL OUTLOOK ASK MY PHONE NUMBER AND SEND A 4 NUMBER CODE VIA SMS TO VERIFY MY ACCOUNT MY QUESTION IS HOW DOES I SKIP IT OR IF I KEEP THIS CODE COULD HELP ME TO RECUPERATE MY ACCOUNT.
You don’t skip it – it’s an important part of confirming you are the rightful account owner.
help my mail outlook sending code by this phone number
It’s not good to post phone numbers or email address in a public forum. Though this may not seem on topic, it would be helpful to read this article: https://askleo.com/internet_safety_8_steps_to_keeping_your_computer_safe_on_the_internet/
One thing to add, follow the instructions as Leo put it. Don’t choose to save the key on Microsoft’s servers, this weakens the provided security. If Microsoft’s servers were to become cracked, the thief would have hundreds of millions, if not billions, of user’s credentials, as some users has more than one Microsoft Account.
This is another reason why I use a Local account on Windows 8.1 & don’t bother with 10 at all. Rather, I run Linux MInt as my primary OS & that’s where I perform transactions, check emails, etc.
There is no longer an “account details” under Options to click on, and the screen shots are no longer accurate. I don’t know how to insert a screenshot of what I’m seeing here. I get locked out every year when I travel to Europe, and I don’t have a cell phone over there to have a code texted to, so this is a huge annoyance every year, so I’d really like to get a security code before I leave this year.
Companies constantly change their web interface – but it’s still helpful to know what to look for, often takes a bit more looking to find it
When I got down to putting in my other email acct for recovery & clicked send code nothing happened. Did it several times & nada?
What now?
Unfortunately, this doesn’t work anymore. Microsoft has removed much of this functionality. I was only able to create the code on my ‘old interface’ Live account. I couldn’t do it on my ‘new interface’ Outlook account. When it came time to use the code, it wasn’t accepted.
It might be time to archive this one!
I just checked, and I was able to get a new recovery code from outlook.com for my Hotmail account.
Yes, I know– I was able to make one, too. And then when I was overseas and locked out, it wouldn’t accept the code. Try to use the code and see if it works.
Will the security code help when I can’t access my hotmail because I am traveling? This happens even in the US. I set up my account so long ago that I am apparently unable to answer enough of their security questions to satisfy them (and I answered a LOT!) Can someone let me know if this works for when I’m traveling and using a computer other than my own? Thanks!
It should. That’s one of the things it’s designed for. It’s also a good idea to have more than one recovery email as those can also get you in when you travel. A good alternate email address is with a company like gmx.com (gmx.de/at or ch in Europe). They don’t require second factor authentication when you travel.
Thanks Mark, I appreciate it, will definitely set up the security code.
Hi. My Outlook email address is:
1. My last sent email subjects (4 nos.)______I hardly can remember the exact email subject of my recently send emails as my last sent email maybe about 20 days ago. But still some of them I managed to get from the receivers I sent before.
2. Additional folders I created so far (4 nos.)_____So far I didn’t created any additional folders.
3. Passwords I used so far (4 nos.)_____I’m using this password for about 10 years now, so I can’t remember others.
4. Country/Region: I opened this account at Bangladesh and later I moved to Singapore 4 years ago. I don’t know which one they are asking for.
5. Postal Code: I changed my apartment several times. So I don’t know which one they are asking for. It should be among them (120346, 120340, 120326)
6. Credit Card Information: So far I used 2 credit cards so I don’t know which one they are asking for. But I have both credit cards information.
Please let me know how I can recover my account now.
Thanks
You may not be able to. This simply underscores the importance of backing up your account contents, and keeping recovery information up to date always. Sorry I don’t have better news for you.
None of the above even exists. There is no managing my account option. It is now 2016. Is this option even available anymore?
Yes. On my Microsoft account I still see the Gear, and options, and Account Details. It looks mostly the same. So try again.
“If you previously had a recovery code, it is no longer valid”
If someone hacks my account, and changes the code, won’t this render my recovery code useless?
Yes. This is one reason that recovering your account quickly is important, and one reason that recovery codes are only a part of your overall security.
Good write up. And still viable.
To avoid confusion though you might want to update the document, as is often the case, documentation about websites is a moving target. Microsoft has changed the page layout, so the screen captures in this document no longer match their site.
I *just* updated this last week.
thanks Leo, I have finally generated a recovery code from Microsoft. None of the options you mentioned came up; it took a half hour chat with a microsoft chap to help me out and get me that code. I have two step verification, but as part of it was my phone no it didn’t seem the best security! But I’ve got the verification code now, written down in a safe place, so lest the worst happens, I have it. Thanks again Leo.
JD
Leo. I followed the steps. The windows matched those in your article (I’m on 8.1) and the process worked without a hitch. Thank you
I’ve printed the code, and I will store one copy in my filing cabinet, and another copy with my out-of-house backup (in a plastic bag in a box in the garage, down the bottom of the garden – safe if the house burns down).
Расшифровка меню recovery на андроид
Recovery Mode (режим восстановления) — специальный режим загрузки аппарата, который позволяет делать сброс до заводских настроек, бэкапы и другие системные действия.
Чаще всего его используют для полного сброса, когда нет доступа к стандартным настройкам системы. Процедура входа в Recovery разная для каждого производителя. Например, на смартфонах Samsung нужно зажать «кнопка питания + Home + качелька регулировки громкости вверх». На Nexus-устройствах — «кнопка включения + регулировки громкости вниз». Управление в самом рекавери осуществляется с помощью кнопок регулировки громкости и кнопки питания.
Внимание! Открытие Recovery не является опасной процедурой и не лишает пользователя гарантии, но дальнейшие действия могут привести к разным последствиям, ответственность за которые несете исключительно вы.
Есть несколько видов режима восстановления: стоковое и кастомное. Рассмотрим их более подробно.
Стоковое
Стоковый Recovery Mode идет вместе с устройством изначально и не отличается особой функциональностью. В большинстве случаев в нем присутствуют следующие пункты:
Во многих смартфонах на Android 7.0 Nougat в меню Recovery появились и такие функции:
Кастомное
Кастомное рекавери включает гораздо большее количество функций. Чаще всего его используют для установки сторонних прошивок и создания образа восстановления системы (nandroid backup), также есть возможность сделать вайп (очистить) отдельные разделы, например, data, dalvik cache, вернуть телефон в исходное состояние без потери данных, восстановить права системных приложений и так далее. Самыми популярными являются CWM и TWRP.
Мобильные устройства уже довольно плотно вошли в нашу жизнь. Теперь человек не представляет себе существования без смартфона или планшета. Огромной популярностью пользуются устройства на базе операционной системы “Андроид”. Эта ОС была разработана компанией Google, и сейчас ее доля на рынке невероятно высока. У iOS от Apple и Windows Phone ничтожный процент присутствия на мобильных рынках по сравнению с “Андроид”. Однако, как и вся техника, устройства на этой платформе имеют свойство “глючить”. Различные системные сбои – отличительная черта любой операционной системы. Какой бы продвинутой она ни была. Очень часто девайсы приходится перепрошивать. Но не все знают, что можно обойтись и без столь радикальных мер. Ведь в любом гаджете на “Андроид” есть Android System Recovery 3e. Как пользоваться им и что это вообще такое? Об этом мы и поговорим.
Что это за зверь?
Что означает Android System Recovery 3e? Это своеобразный БИОС мобильного устройства. Любая операционная система имеет свой БИОС – базовую систему ввода-вывода, которая способна работать даже при повреждении основной ОС. Иногда БИОС непохож на стандартный (как, например, в девайсах на “Андроид”). Он служит для того, чтобы восстановить работоспособность смартфона или планшета, применить критические обновления или сделать сброс на заводские настройки. Меню Android System Recovery 3e имеет множество пунктов, которым соответствует то или иное действие. Но беда в том, что названия написаны на английском языке. Поэтому многие и знать не знают, как правильно пользоваться рекавери.
Именно поэтому написана эта статья. Android System Recovery, инструкция к которому совершенно необходима, является мощным инструментом для настройки и реанимации смартфона. Нужно все знать о том, как пользоваться этим рекавери для того, чтобы не тратить деньги на мастеров. Сделать все самому куда проще и дешевле. Мы разберем каждый пункт меню рекавери и расскажем о нем все, что только можно. Итак, начинаем.
Как войти в рекавери?
Это зависит от конкретной модели устройства. В некоторых аппаратах нужно зажать кнопку включения и клавишу “Громкость +”. Но иногда встречаются смартфоны, которым этого недостаточно. Старые модели с механической кнопкой “Домой” требуют нажатия и этой кнопки. Некоторые девайсы требуют одновременного нажатия кнопок включения и “Громкость”. Есть и такие, которым обязательно зажатие клавиши включения и обеих кнопок регулирования громкости. Это касается только оригинальных устройств от известных производителей.
Но есть также и откровенно “китайские” гаджеты с непонятной операционной системой и “кривым” переводом. Стандартные методы входа в рекавери в этих случаях могут и не сработать. Здесь есть несколько вариантов. Первый: изучить документацию смартфона (если она имеется) и найти искомую комбинацию клавиш. Но этот вариант подойдет далеко не всем. У большинства таких устройств либо нет вообще никаких документов, либо в документах вообще нет русского языка. Второй вариант: найти нужную комбинацию путем поочередного нажатия всех кнопок. А теперь перейдем к пунктам меню Android System Recovery 3e.
Reboot system now
Этот пункт меню выполняет полную перезагрузку устройства. После выбора этой опции смартфон загрузит стандартную операционную систему “Андроид” без всяких изменений. Обычно этот пункт используют по завершении всех манипуляций в рекавери. Или же в том случае, если загрузились в этот режим случайно. Хотя, как это сделать можно случайно – неизвестно. Как бы то ни было, Android System Recovery 3e, инструкция по эксплуатации которого просто жизненно необходима пользователю, имеет такой пункт. И с этим приходится считаться.
Пункт меню Reboot system now нужно использовать в самую последнюю очередь. То есть тогда, когда все операции выполнены, все компоненты обновлены, заводские настройки сброшены и прошивки установлены. В этом и есть суть перезагрузки: дать устройству применить все сделанные изменения. Правда, после некоторых из них смартфон может вообще не загрузиться. Но это уже совсем другая история.
Apply Update from External Storage
Этот пункт меню позволяет применить обновление, которое находится на карте памяти. Кстати, через этот пункт устанавливают и новые прошивки в том случае, если основная ОС не грузится. Есть несколько подпунктов в этом меню Android System Recovery 3e. Как прошить новую ОС? Для этого нужно зайти в данное меню и выбрать пункт Choose ZIP from SD Card, если прошивка в формате ZIP. Если же это просто файл обновления, то следует выбрать Apply Update From SD Card. Именно так прошивается любой аппарат с помощью рекавери. Достаточно просто скопировать файл прошивки в корень карты памяти, зайти в рекавери и выбрать нужный пункт.
В этом пункте есть и другие подпункты, которые применяются в нестандартных ситуациях. Есть возможность проверить MDSUM файла прошивки. Эта опция проверяет файл на целостность и если что-то не так, тут же выдает предупреждение. Также можно проверить файл прошивки на совместимость с устройством. Это информационные опции Android System Recovery 3e. Инструкции как таковой к ним не требуется. Если есть ошибки, то ставить данную прошивку не нужно. Вот и весь сказ.
Wipe Data. Factory Reset
Вот это очень важный пункт. Сия опция способна восстановить работоспособность аппарата без всяких прошивок. Этот инструмент сбрасывает операционную систему гаджета на заводские настройки. Естественно, все, что находилось на смартфоне будет удалено: приложения, фотографии, музыка. В общем, все то, что находилось во внутренней памяти телефона. Android System Recovery 3e, инструкция по эксплуатации которого здесь рассматривается, создан как раз для того, чтобы возродить аппарат без серьезного вмешательства в прошивку. И эта опция позволяет выполнить сию операцию.
Эта функция также используется перед установкой любой прошивки. Сбрасывать телефон на заводские настройки перед прошивкой необходимо. В противном случае новая операционная система будет работать нестабильно. Но это еще не самое худшее. Если не вернуться к заводским настройкам, то прошивка может вообще не установиться, и тогда пользователь получит совершенно “мертвый” смартфон. Инструкция на русском языке отсутствует, но та, что есть, ясно говорит, что использовать пункт Wipe Data & Factory Reset обязательно нужно перед каждой прошивкой устройства.
Wipe Cache Partition
Еще одна полезная команда в Android System Recovery 3e. Инструкция к рекавери говорит о том, что использовать эту опцию нужно в тандеме с Wipe Data. Если предыдущий пункт очищает внутреннюю память устройства, то этот очищает его кеш. А именно там хранятся рабочие файлы приложений. Конечно, если этого не сделать перед прошивкой, то ничего страшного не произойдет. Просто в дальнейшем, при установке новых программ, кеш устройства разрастется до неимоверных размеров. В результате чего смартфон будет очень медленно работать. Но это не так страшно, поскольку есть множество программ для чистки кеша ОС Андроид. И они прекрасно работают.
Также рекомендуется выбирать эту функцию после того, как был сделан сброс на заводские настройки. Это поможет смартфону стать еще “чище”, что положительно повлияет на работоспособность операционной системы. Инструкция на русском языке к Android System Recovery 3e рекомендует выполнять эту процедуру именно после сброса. До перезагрузки устройства. Тогда все будет так, как должно быть.
Wipe Battery Stats
Эта функция помогает обновить батарею устройства. После нажатия на этот пункт начинает очищаться кэш аккумулятора, в который записывается текущее состояние элемента питания, его номинальная емкость и прочие нужные параметры. Сбросив статистику использования аккумуляторной батареи, можно будет немного продлить ее жизнь. Да и новая прошивка будет работать с аккумулятором адекватнее. Почему-то многие “гуру” “Андроида” пренебрежительно относятся к этой опции. Но на самом деле она очень полезна. Однако применять ее слишком часто не рекомендуется. Только перед перепрошивкой устройства.
Mounts. Storage
Здесь находятся элементы управления внутренней и внешней памятью смартфона. Этот пункт позволяет очистить карту памяти или встроенную память, отформатировать ее или присоединить в качестве накопителя прямо из рекавери. Этот раздел может использоваться в том случае, если вы забыли скинуть на карту памяти файл прошивки, а перезагружать смартфон в операционную систему нет никакого желания. Для того, чтобы смонтировать карту памяти устройства в качестве накопителя нужно выбрать пункт Mount USB Storage. Как только соединение будет установлено, компьютер сам установит необходимые драйвера для работы.
После установки соединения можно делать с картой памяти все что угодно: форматировать, очищать, копировать нужные файлы и так далее. Для того чтобы размонтировать флешку, следует выбрать на экране смартфона в рекавери пункт Umount USB Storage. После этого можно будет переходить к другим пунктам рекавери и производить дальнейшую реанимацию устройства собственными силами.
Ошибки рекавери
Иногда возникает такая распространенная ошибка в Android System Recovery 3e, как отмена установки прошивки или пакета. Возникнуть она может по нескольким причинам: файл с прошивкой поврежден, неверная информация в бинарном файле или прошивка просто не подходит этому девайсу. Но есть и еще один вариант: перед прошивкой не был произведен сброс на заводские настройки. Хорошо, что их можно легко исправить в том же рекавери. Для этого существует несколько способов.
Итак, если ошибка возникает по вине битого файла прошивки, то следует перекачать ее, подключить смартфон к компьютеру, зайти в пункт меню Mount & Storage и выбрать Mount USB Storage. После этого можно заново копировать прошивку в корень карты памяти. Если вы забыли сделать “вайп”, то нет ничего проще, чем переместиться на несколько уровней выше и выбрать соответствующий пункт меню. А вот ошибка Android System Recovery 3e “Команды нет” встречается очень редко. Она появляется только тогда, когда пользователь пытается установить обновление по ADB. Обычно этот метод не работает. Вследствие чего и появляется сия ошибка. Так что использовать этот метод не имеет смысла. Все равно ничего не получится.
Заключение
Итак, подведем итоги. Мы попытались описать возможности Android System Recovery 3e. Инструкция, которая получилась в результате этой попытки, поможет начинающим пользователям операционной системы “Андроид” научиться восстанавливать работоспособность своего смартфона своими руками. Что в конечном итоге приведет к расширению кругозора и неплохой экономии денежных средств.
Help with the Microsoft account recovery form
We recommend following the steps in this order to assist you with resetting your Microsoft account password.
| | | |
| | | |
Функция | |
File System Check | функция, позволяющая провести проверку всех файлов системы |
Print Partition Info | аналитика системы и вывод view logs (лога) на экран |
Copy recovery. log to sdcard | опция копирования лога восстановления и его запись |
Fix Permission | функция, позволяющая изменить права на файлы в разделе /data |
Partition SD Card | опция для образования разделов ext и ext2 на карте памяти. Здесь можно либо создать разделы (для этого необходимо войти в Remove all partitions and start from scratch), либо же выйти назад в главное меню Рекавери без сохранения изменений (для этого нужно зайти в раздел No — save my fat32 partition). |
Power menu — дословно переводится как «меню питания». Здесь можно выполнить такие операции: полностью выключить устройство (power off), перезагрузить смартфон (reboot), произвести перезагрузку в режиме Рекавери (reboot recovery).
Все эти функции присутствуют в разделе Рекавери практически каждого устройства. В зависимости от модели смартфона или планшета функционал System Recovery может расширяться или сужаться.
Пошаговые инструкции
Рассмотрим основные функции Android System Recovery 3e:
В основном режим Recovery используют в крайних случаях. Например, когда требуется перепрошивка смартфона после каких-то повреждений внутренних файлов системы, из-за чего включить устройство невозможно. Приведем краткую инструкцию на русском Android System Recovery 3e.
Если необходимо перепрошить устройство, то нужно зайти в раздел Install from SD-card (может еще называться Apply Update from External Storage). Здесь можно установить прошивку с карты памяти. Для этого нужно войти в подпункт Choose Zip from SD-card, если новая система сохранена в архиве, или же выбрать образ прошивки при помощи пункта Apply Update from SD-card.
Если прошивка устанавливается в первый раз или же нет уверенности в совместимости новой версии системы с устройством, то перед инсталляцией рекомендуется воспользоваться опцией toggle sclipt assert. Она позволит верифицировать исправность, подлинность и совместимость прошивки и смартфона.
После обновления системы нужно воспользоваться функцией Reboot now, которая перезагрузит смартфон. Перед перезагрузкой следует убедиться, что сделаны все необходимые операции, так как после ресетирования версия будет обновлена и все изменения вступят в силу. При помощи Reboot now можно также провести перезагрузку, если в режим рекавери пользователь попал случайно и нужно сделать backup (возврат в главное меню системы).
Дополнительные возможности
Еще одна важная опция режима восстановления — Wipe Data. Благодаря этой функции можно восстановить систему без применения прошивок и сброса системных установок. Работает опция по принципу сброса настроек телефона к заводским установкам. При этом все файлы (изображения, видео- и аудиофайлы, загрузки и т. д. ) будут удалены с телефона.
Использовать функцию Wipe Data необходимо также перед прошивкой устройства, поскольку перед переустановкой системы все настройки любого аппарата нужно сбросить до первоначальных. Если этого не сделать, то после прошивки смартфон может вообще не включиться.
Wipe Cache Partition — не менее полезная функция режима Рекавери, позволяющая произвести очистку кеша системы. Она поможет убрать весь мусор из памяти телефона, что ускорит работу устройства.
После того как будут произведены все необходимые действия, можно перезагрузить систему при помощи описанной выше функции Reboot Now. При правильной перепрошивке Андроид обновления вступят в силу.
How to Recover an Accidentally Saved Over Word Document?
You may have spent a long time constructing an extensive essay, an article, or a report, but accidentally saved over it with an empty document. It seems all hope lost. Fortunately, there are some dependable ways that can recover an overwritten Word document quickly and effectively. Now, let’s go through them one by one.
Bonus Tip 2: How to Recover a Deleted Word Document
Solution 1: Undo Save in Word
If you accidentally saved over a Word document, the best and easiest way is to recall the operation. You only need to press Ctrl + Z at the same time, then you can recover the Word document to its previous version.
Solution 2: Recover Word File From the Temp Files
When you work on a Word file, Office creates some temp files automatically as a backup in case you forget to save the document. It creates a new temp file after a specific time without overwriting the previous ones. So if you accidentally saved over a word document, you can find your required file from the temp files. However, you need to enable the AutoRecover option before you overwritten the original document.
To recover overwritten Word document from the temp files, you will have to find the location of the temp files on your PC first. After navigating into corresponding folder, you will locate the temp file you need.
On Windows XP/7/8/10/11 system, the file location path is usually: C:\Users\UserName\AppData\Roaming\Microsoft\Word\
If you are also a regular user of Microsoft Excel, temp files is also a workable way to recover unsaved excel files.
Solution 3: Recover Word Document From Backup Copy
Tip
If you haven’t enabled this feature yet, you can navigate to File > Options > Advanced > Save > Check «Always create backup copy».
Solution 4: Restore Word Document to Previous Version
If the above methods fail to work, you can try to restore accidentally saved over Word file by restoring it to the previous version.
Step 1: Create a new Word file with the same name as the Word file that got accidentally overwritten before. Alternatively, you can locate your overwritten or saved-over Word file.
Step 2: After creating a new file or locating the old one, right-click on the Word file. A menu will appear, then select «Properties» option there.
Step 3: You will find a «Previous Versions» tab. Click on the tab. Here you’ll see different versions of the Word file. Restore the version you need.
Tip
Bonus Tip 1: How to Recover a Saved Over Word Document on Mac
The above 4 solutions apply to Windows users. If you are using a Mac computer then you should check the solutions below.
Method 1: Recover an Overwritten Word Document With Time Machine
Time Machine is a built-in backup and restore tool on Mac. It can create backups of your files hourly, daily and weekly until the volume is out of space. Therefore, you can easily recover a saved-over Word document in a specific time. Here is how to do it:
Step 1: Click on the Time Machine icon on the menu bar, choose «Enter Time Machine».
Step 2: Select a folder where your Word document located.
Step 3: Choose a point of time, then click on the «Restore» button in the lower right corner.
Method 2: Use Track Changes to Restore a Previous Version
Track Changes is another built-in feature of Word. If you have turned on this feature at the very beginning, then you can track the changes of your accidentally saved-over document and have it back. Follow the simple steps below:
Step 1: Don’t close your overwritten Word document. Go to Review > Tracking > select Final Showing Markup. Then the tracked changes will appear in the right pane of the document.
Step 2: Now, you can check the changes in detail and restore your document to its previous version.
Bonus Tip 2: How to Recover a Deleted Word Document
The same as an overwritten Word document, an accidentally deleted Word file is frustrating. While there is no program designed to recover an overwritten or saved-over Word document on the market, luckily there are some trustworthy tools designed to recover delete Word documents.
AnyRecover is such a professional program. It is one of the best data recovery software that can help users out in numerous disastrous situation. With this powerful tool, every user can recover lost data easily from all devices ranges from the external hard drive to damaged hard drive at a fair price.
AnyRecover Key features include:
Steps to recover your accidentally deleted Word files with AnyRecover:
Step 1: Run AnyRecover on your PC. Select the location from where you want to recover your data and then tap «Start».
Step 2: AnyRecover will start an all-round scan and deep scan on the disk you selected. You can pause to locate your targeted files or stop it during the scanning process.
Step 3: Preview all the recoverable files. Then select the exact files you need and click the «Recover» button to start recovering.
With AnyRecover, you can recover data in these situations as well:
BitLocker recovery guide
Applies to:
This article for IT professionals describes how to recover BitLocker keys from AD DS.
Organizations can use BitLocker recovery information saved in Active Directory Domain Services (ADВ DS) to access BitLocker-protected data. Creating a recovery model for BitLocker while you are planning your BitLocker deployment is recommended.
This article assumes that you understand how to set up ADВ DS to back up BitLocker recovery information automatically, and what types of recovery information are saved to ADВ DS.
This article does not detail how to configure ADВ DS to store the BitLocker recovery information.
What is BitLocker recovery?
BitLocker recovery is the process by which you can restore access to a BitLocker-protected drive in the event that you cannot unlock the drive normally. In a recovery scenario, you have the following options to restore access to the drive:
What causes BitLocker recovery?
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use BitLocker Device Encryption only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality, administrators can set the Interactive logon: Machine account lockout threshold Group Policy setting located in \Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options in the Local Group Policy Editor. Or they can use the MaxFailedPasswordAttempts policy of Exchange ActiveSync (also configurable through Microsoft Intune), to limit the number of failed password attempts before the device goes into Device Lockout.
On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
Failing to boot from a network drive before booting from the hard drive.
Docking or undocking a portable computer. In some instances (depending on the computer manufacturer and the BIOS), the docking condition of the portable computer is part of the system measurement and must be consistent to validate the system status and unlock BitLocker. So if a portable computer is connected to its docking station when BitLocker is turned on, then it might also need to be connected to the docking station when it is unlocked. Conversely, if a portable computer is not connected to its docking station when BitLocker is turned on, then it might need to be disconnected from the docking station when it is unlocked.
Changes to the NTFS partition table on the disk including creating, deleting, or resizing a primary partition.
Entering the personal identification number (PIN) incorrectly too many times so that the anti-hammering logic of the TPM is activated. Anti-hammering logic is software or hardware methods that increase the difficulty and cost of a brute force attack on a PIN by not accepting PIN entries until after a certain amount of time has passed.
Turning off the support for reading the USB device in the pre-boot environment from the BIOS or UEFI firmware if you are using USB-based keys instead of a TPM.
Turning off, disabling, deactivating, or clearing the TPM.
Upgrading critical early startup components, such as a BIOS or UEFI firmware upgrade, causing the related boot measurements to change.
Forgetting the PIN when PIN authentication has been enabled.
Updating option ROM firmware.
Upgrading TPM firmware.
Adding or removing hardware; for example, inserting a new card in the computer, including some PCMIA wireless cards.
Removing, inserting, or completely depleting the charge on a smart battery on a portable computer.
Changes to the master boot record on the disk.
Changes to the boot manager on the disk.
Hiding the TPM from the operating system. Some BIOS or UEFI settings can be used to prevent the enumeration of the TPM to the operating system. When implemented, this option can make the TPM hidden from the operating system. When the TPM is hidden, BIOS and UEFI secure startup are disabled, and the TPM does not respond to commands from any software.
Using a different keyboard that does not correctly enter the PIN or whose keyboard map does not match the keyboard map assumed by the pre-boot environment. This problem can prevent the entry of enhanced PINs.
Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For example, including PCR[1] would result in BitLocker measuring most changes to BIOS settings, causing BitLocker to enter recovery mode even when non-boot critical BIOS settings change.
Some computers have BIOS settings that skip measurements to certain PCRs, such as PCR[2]. Changing this setting in the BIOS would cause BitLocker to enter recovery mode because the PCR measurement will be different.
Moving the BitLocker-protected drive into a new computer.
Upgrading the motherboard to a new one with a new TPM.
Losing the USB flash drive containing the startup key when startup key authentication has been enabled.
Failing the TPM self-test.
Having a BIOS, UEFI firmware, or an option ROM component that is not compliant with the relevant Trusted Computing Group standards for a client computer. For example, a non-compliant implementation may record volatile data (such as time) in the TPM measurements, causing different measurements on each startup and causing BitLocker to start in recovery mode.
Changing the usage authorization for the storage root key of the TPM to a non-zero value.
The BitLocker TPM initialization process sets the usage authorization value to zero, so another user or process must explicitly have changed this value.
Disabling the code integrity check or enabling test signing on Windows Boot Manager (Bootmgr).
Pressing the F8 or F10 key during the boot process.
Adding or removing add-in cards (such as video or network cards), or upgrading firmware on add-in cards.
Using a BIOS hot key during the boot process to change the boot order to something other than the hard drive.
Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker will reseal the encryption key to the current values of the measured components.
For planned scenarios, such as a known hardware or firmware upgrades, you can avoid initiating recovery by temporarily suspending BitLocker protection. Because suspending BitLocker leaves the drive fully encrypted, the administrator can quickly resume BitLocker protection after the planned task has been completed. Using suspend and resume also reseals the encryption key without requiring the entry of the recovery key.
If suspended BitLocker will automatically resume protection when the PC is rebooted, unless a reboot count is specified using the manage-bde command line tool.
If software maintenance requires the computer to be restarted and you are using two-factor authentication, you can enable BitLocker Network Unlock to provide the secondary authentication factor when the computers do not have an on-premises user to provide the additional authentication method.
Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery before the computer is given to a new user.
Testing recovery
To force a recovery for the local computer:
To force recovery for a remote computer:
On the Start screen, typeВ cmd.exe, and then select Run as administrator.
Planning your recovery process
When planning the BitLocker recovery process, first consult your organization’s current best practices for recovering sensitive information. For example: How does your enterprise handle lost Windows passwords? How does your organization perform smart card PIN resets? You can use these best practices and related resources (people and tools) to help formulate a BitLocker recovery model.
Organizations that rely on BitLocker Drive Encryption and BitLocker To Go to protect data on a large number of computers and removable drives running the WindowsВ 11, Windows 10, Windows 8, or Windows 7 operating systems and Windows to Go should consider using the Microsoft BitLocker Administration and Monitoring (MBAM) Tool version 2.0, which is included in the Microsoft Desktop Optimization Pack (MDOP) for Microsoft Software Assurance. MBAM makes BitLocker implementations easier to deploy and manage and allows administrators to provision and monitor encryption for operating system and fixed drives. MBAM prompts the user before encrypting fixed drives. MBAM also manages recovery keys for fixed and removable drives, making recovery easier to manage. MBAM can be used as part of a Microsoft System Center deployment or as a stand-alone solution. For more info, see Microsoft BitLocker Administration and Monitoring.
After a BitLocker recovery has been initiated, users can use a recovery password to unlock access to encrypted data. Consider both self-recovery and recovery password retrieval methods for your organization.
When you determine your recovery process, you should:
Become familiar with how you can retrieve the recovery password. See:
Determine a series of steps for post-recovery, including analyzing why the recovery occurred and resetting the recovery password. See:
Self-recovery
In some cases, users might have the recovery password in a printout or a USB flash drive and can perform self-recovery. We recommend that your organization create a policy for self-recovery. If self-recovery includes using a password or recovery key stored on a USB flash drive, the users should be warned not to store the USB flash drive in the same place as the PC, especially during travel, for example if both the PC and the recovery items are in the same bag, then it’s easy for an unauthorized user to access the PC. Another policy to consider is having users contact the Helpdesk before or after performing self-recovery so that the root cause can be identified.
Recovery password retrieval
If the user does not have a recovery password in a printout or on a USB flash drive, the user will need to be able to retrieve the recovery password from an online source. If the PC is a member of a domain, the recovery password can be backed up to AD DS. However, this does not happen by default. You must have configured the appropriate Group Policy settings before BitLocker was enabled on the PC. BitLocker Group Policy settings can be found in the Local Group Policy Editor or the Group Policy Management Console (GPMC) under Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption. The following policy settings define the recovery methods that can be used to restore access to a BitLocker-protected drive if an authentication method fails or is unable to be used.
In each of these policies, select Save BitLocker recovery information to Active Directory Domain Services and then choose which BitLocker recovery information to store in Active Directory Domain Services (ADВ DS). Select the Do not enable BitLocker until recovery information is stored in AD DS check box if you want to prevent users from enabling BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information for the drive to ADВ DS succeeds.
If the PCs are part of a workgroup, users should be advised to save their BitLocker recovery password with their Microsoft Account online. Having an online copy of your BitLocker recovery password is recommended to help ensure that you do not lose access to your data in the event that recovery is required.
The BitLocker Recovery Password Viewer for Active Directory Users and Computers tool allows domain administrators to view BitLocker recovery passwords for specific computer objects in Active Directory.
You can use the following list as a template for creating your own recovery process for recovery password retrieval. This sample process uses the BitLocker Recovery Password Viewer for Active Directory Users and Computers tool.
Record the name of the user’s computer
You can use the name of the user’s computer to locate the recovery password in ADВ DS. If the user does not know the name of the computer, ask the user to read the first word of the Drive Label in the BitLocker Drive Encryption Password Entry user interface. This is the computer name when BitLocker was enabled and is probably the current name of the computer.
Verify the user’s identity
Verify that the person that is asking for the recovery password is truly the authorized user of that computer. You might also want to verify that the computer with the name the user provided belongs to the user.
Locate the recovery password in ADВ DS
Locate the Computer object with the matching name in ADВ DS. Because Computer object names are listed in the ADВ DS global catalog, you should be able to locate the object even if you have a multi-domain forest.
Multiple recovery passwords
If multiple recovery passwords are stored under a computer object in ADВ DS, the name of the BitLocker recovery information object includes the date that the password was created.
If at any time you are unsure what password to provide, or if you think you might be providing the incorrect password, ask the user to read the eight character password ID that is displayed in the recovery console.
Since the password ID is a unique value that is associated with each recovery password stored in ADВ DS, running a query using this ID will find the correct password to unlock the encrypted volume.
Gather information to determine why recovery occurred
Before you give the user the recovery password, you should gather any information that will help determine why the recovery was needed, in order to analyze the root cause during the post-recovery analysis. For more info about post-recovery analysis, see Post-recovery analysis.
Give the user the recovery password
Because the recovery password is 48 digits long, the user might need to record the password by writing it down or typing it on a different computer. If you are using MBAM, the recovery password will be regenerated after it is recovered from the MBAM database to avoid the security risks associated with an uncontrolled password.
Because the 48-digit recovery password is long and contains a combination of digits, the user might mishear or mistype the password. The boot-time recovery console uses built-in checksum numbers to detect input errors in each 6-digit block of the 48-digit recovery password, and offers the user the opportunity to correct such errors.
Post-recovery analysis
When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption when data is written to the volume, and on-the-fly decryption when data is read from the volume. After the volume is unlocked, BitLocker behaves the same way, regardless of how the access was granted.
If you notice that a computer is having repeated recovery password unlocks, you might want to have an administrator perform post-recovery analysis to determine the root cause of the recovery and refresh BitLocker platform validation so that the user no longer needs to enter a recovery password each time that the computer starts up. See:
Determine the root cause of the recovery
If a user needed to recover the drive, it is important to determine the root cause that initiated the recovery as soon as possible. Properly analyzing the state of the computer and detecting tampering may reveal threats that have broader implications for enterprise security.
While an administrator can remotely investigate the cause of recovery in some cases, the end user might need to bring the computer that contains the recovered drive on site to analyze the root cause further.
Review and answer the following questions for your organization:
Resolve the root cause
After you have identified what caused recovery, you can reset BitLocker protection and avoid recovery on every startup.
The details of this reset can vary according to the root cause of the recovery. If you cannot determine the root cause, or if malicious software or a rootkit might have infected the computer, Helpdesk should apply best-practice virus policies to react appropriately.
You can perform a BitLocker validation profile reset by suspending and resuming BitLocker.
Unknown PIN
If a user has forgotten the PIN, you must reset the PIN while you are logged on to the computer in order to prevent BitLocker from initiating recovery each time the computer is restarted.
To prevent continued recovery due to an unknown PIN
Lost startup key
If you have lost the USB flash drive that contains the startup key, then you must unlock the drive by using the recovery key and then create a new startup key.
To prevent continued recovery due to a lost startup key
Changes to boot files
This error might occur if you updated the firmware. As a best practice, you should suspend BitLocker before making changes to the firmware and then resume protection after the update has completed. This action prevents the computer from going into recovery mode. However if changes were made when BitLocker protection was on, then log on to the computer using the recovery password, and the platform validation profile will be updated so that recovery will not occur the next time.
Windows RE and BitLocker Device Encryption
Windows Recovery Environment (RE) can be used to recover access to a drive protected by BitLocker Device Encryption. If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR[7] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair can’t run automatically from the PC and instead Windows RE is manually started from a repair disk, then the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
BitLocker recovery screen
During BitLocker recovery, Windows can display a custom recovery message and hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery.
Custom recovery message
BitLocker Group Policy settings in Windows 10, version 1511, or WindowsВ 11, let you configure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support.
This policy can be configured using GPO under Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Configure pre-boot recovery message and URL.
It can also be configured using Intune mobile device management (MDM) in the BitLocker CSP: ./Device/Vendor/MSFT/BitLocker/SystemDrivesRecoveryMessage
Example of customized recovery screen:
BitLocker recovery key hints
BitLocker metadata has been enhanced in Windows 10, version 1903 or WindowsВ 11 to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume’s recovery key. Hints are displayed on the recovery screen and refer to the location where the key has been saved. Hints are displayed on both the modern (blue) and legacy (black) recovery screen. This applies to both the boot manager recovery screen and the WinRE unlock screen.
We don’t recommend printing recovery keys or saving them to a file. Instead, use Active Directory backup or a cloud-based backup. Cloud-based backup includes Azure Active Directory (Azure AD) and Microsoft Account.
There are rules governing which hint is shown during the recovery (in order of processing):
Example 1 (single recovery key with single backup)
Custom URL | Yes |
---|---|
Saved to Microsoft Account | Yes |
Saved to Azure AD | No |
Saved to Active Directory | No |
Printed | No |
Saved to file | No |
Result: The hint for the Microsoft Account and the custom URL are displayed.
Example 2 (single recovery key with single backup)
Custom URL | Yes |
---|---|
Saved to Microsoft Account | No |
Saved to Azure AD | No |
Saved to Active Directory | Yes |
Printed | No |
Saved to file | No |
Result: Only the custom URL is displayed.
Example 3 (single recovery key with multiple backups)
Custom URL | No |
---|---|
Saved to Microsoft Account | Yes |
Saved to Azure AD | Yes |
Saved to Active Directory | No |
Printed | Yes |
Saved to file | Yes |
Result: Only the Microsoft Account hint is displayed.
Example 4 (multiple recovery passwords)
Custom URL | No |
---|---|
Saved to Microsoft Account | No |
Saved to Azure AD | No |
Saved to Active Directory | No |
Printed | No |
Saved to file | Yes |
Creation time | 1PM |
Key ID | A564F193 |
Custom URL | No |
---|---|
Saved to Microsoft Account | No |
Saved to Azure AD | No |
Saved to Active Directory | No |
Printed | No |
Saved to file | No |
Creation time | 3PM |
Key ID | T4521ER5 |
Result: Only the hint for a successfully backed up key is displayed, even if it isn’t the most recent key.
Example 5 (multiple recovery passwords)
Custom URL | No |
---|---|
Saved to Microsoft Account | Yes |
Saved to Azure AD | Yes |
Saved to Active Directory | No |
Printed | No |
Saved to file | No |
Creation time | 1PM |
Key ID | 99631A34 |
Custom URL | No |
---|---|
Saved to Microsoft Account | No |
Saved to Azure AD | Yes |
Saved to Active Directory | No |
Printed | No |
Saved to file | No |
Creation time | 3PM |
Key ID | 9DF70931 |
Result: The hint for the most recent key is displayed.
Using additional recovery information
Besides the 48-digit BitLocker recovery password, other types of recovery information are stored in Active Directory. This section describes how this additional information can be used.
BitLocker key package
If the recovery methods discussed earlier in this document do not unlock the volume, you can use the BitLocker Repair tool to decrypt the volume at the block level. The tool uses the BitLocker key package to help recover encrypted data from severely damaged drives. You can then use this recovered data to salvage encrypted data, even after the correct recovery password has failed to unlock the damaged volume. We recommend that you still save the recovery password. A key package cannot be used without the corresponding recovery password.
You must use the BitLocker Repair tool repair-bde to use the BitLocker key package.
The BitLocker key package is not saved by default. To save the package along with the recovery password in AD DS, you must select the Backup recovery password and key package option in the Group Policy settings that control the recovery method. You can also export the key package from a working volume. For more details about how to export key packages, see Retrieving the BitLocker Key Package.
Resetting recovery passwords
Invalidate a recovery password after it has been provided and used. It should also be done when you intentionally want to invalidate an existing recovery password for any reason.
You can reset the recovery password in two ways:
To reset a recovery password using manage-bde:
Remove the previous recovery password
Add the new recovery password
Get the ID of the new recovery password. From the screen, copy the ID of the recovery password.
Back up the new recovery password to AD DS.
You must include the braces in the ID string.
To run the sample recovery password script:
Save the following sample script in a VBScript file. For example: ResetPassword.vbs.
At the command prompt, type a command similar to the following sample script:
cscript ResetPassword.vbs
This sample script is configured to work only for the C volume. You must customize the script to match the volume where you want to test password reset.
To manage a remote computer, you can specify the remote computer name rather than the local computer name.
You can use the following sample VBScript to reset the recovery passwords:
Retrieving the BitLocker key package
You can use two methods to retrieve the key package, as described in Using Additional Recovery Information:
The following sample script exports all previously saved key packages from ADВ DS.
To run the sample key package retrieval script:
Save the following sample script in a VBScript file. For example: GetBitLockerKeyPackageADDS.vbs.
At the command prompt, type a command similar to the following sample script:
You can use the following sample script to create a VBScript file to retrieve the BitLocker key package from ADВ DS:
The following sample script exports a new key package from an unlocked, encrypted volume.
To run the sample key package retrieval script:
Save the following sample script in a VBScript file. For example: GetBitLockerKeyPackage.vbs
Open an administrator command prompt, and then type a command similar to the following sample script:
How to Recover Unsaved Excel Files [All Options + Precautions]
Let me tell you the shortest horror story ever.
Excel Crashed!
Imagine working on that urgent report or that extremely important dashboard where you have done such a fantastic job. You are proud of yourself and all the hard work you have put into it.
But you forgot a key step.
You didn’t save the Excel file (gasp. )
Ok, let me cut down on the dramatics and come straight to the point.
Excel has a tendency to crash, especially when you need it not to. Somehow, it happens at the worst possible time (not that there is a good time for this ever).
In such a scenario, your only option is to try and recover unsaved Excel files.
In some cases, you will be smiled upon by the Excel Gods and you’ll get the file, and in some cases, you may not.
In this article, I will share all there is to know when it comes to recovering unsaved Excel files. I will also show you the precautions and pre-emptive steps you need to take.
And if you want to absolutely make sure nothing goes wrong, I will also share a VBA code that will save a copy of your Excel file with a timestamp whenever you save the existing file.
This Tutorial Covers:
All Possible Ways to Recover Unsaved Excel Files / Data
Excel (and even Windows) is highly unpredictable. It can crash anytime and can your Excel files with it.
It’s a bad situation to be in…
…but there are ways to tackle this.
Excel has a few functionalities where it can help you recover unsaved Excel files or data in some cases.
Here are three scenarios where Excel’s in-built checks can help you recover files/data:
Let’s see how to tackle each of these.
Recover a New Unsaved Excel File (that has never been saved)
If you are working on something and Excel crashes (or your system crashes), you can still recover that unsaved file.
Below are the steps to recover an unsaved Excel file:
By default, Excel saves a copy of all the unsaved files at the following location:
In the above address, you need to replace [YourSystemName] with the name of your system (which is ‘Sumit’ in my case).
You can also go directly to this folder (where unsaved copies of Excel files are saved) by opening any browser and copy-pasting the address in it (in the place of URL).
When you open any file from this folder, you will see a notification bar that will prompt you to save it.
Click on it and save it at a new location with a name of your choice.
With this method, you can recover files which you created but never saved.
Recover Updated Excel Files (the previous version was saved)
This method can be used for files which you have saved earlier, and Excel crashed (or the system crashed or the power went off) when you were working on it.
So you still have the previously saved file, but you lost the changes you did.
Below are the steps to recover the updated Excel file:
Alternatively, you can also open the Excel application, and you will see the ‘Show Recovered Files’ option (as shown below).
You can click on it and it will open the same Document Recovery pane.
Recover Overwritten Excel Files / Previously Saved Version (from within Excel)
While in the above two methods you can blame Excel or Windows for crashing or the power failure, this one is purely on you.
This is the case when you have a saved Excel file and you update the data and save it again.
But you end up making some changes you don’t want now (happens to me a lot).
What you really want is to get the previous version back.
While you can’t go back in life and correct your mistakes (unless you have a time machine of course), you can do that in the wonderful world of Excel spreadsheets.
In Excel 2010 and versions after that, Excel got an in-built feature to help you get the previous versions.
Below are the steps to revert to a previous version of Excel (even when you have updated and saved it):
When you select a previously saved version and open it, Excel will show you a prompt as shown below. You can click on Restore to get the previous version that you have selected or can save it as a new file with a different name.
Note that for this to work, you need to make sure that AutoRecover option is enabled. While it usually is enabled by default, it’s something you can check and ensure. I cover how to enable ‘AutoRecover’ later in this tutorial.
When it comes to recovering unsaved Excel files or data, these are the three in-built options in Excel that can be used.
Another way (which I highly recommend) is to save your files on the cloud (OneDrive or DropBox). This takes away a lot of worries as the cloud services keep previous versions of your files.
Recover Overwritten Excel Files / Previously Saved Version (from the cloud – OneDrive/DropBox)
If you’re in the habit of saving your Excel files on the cloud – by using services such as OneDrive or DropBox, you don’t have to completely rely on Excel to help you recover unsaved files or lost data.
These cloud services also keep previous versions of your Excel files.
Let me show you how to get the previous versions from OneDrive and DropBox. I am sure there must be many more such services that have this functionality.
Getting the Previous Version of the Excel File from OneDrive
To get the previous version of an Excel file, right click on the current version in Onedrive and click on Version History.
This will open the file and you can see all the previous versions of the file in the pane on the left.
Click on the version that you want. It will show you the file content and also give you the option to download that file or restore it.
Getting the Previous Version of the Excel File from DropBox
Just like OneDrive, DropBox also keeps the past versions of the Excel files that you can revisit and download.
To get the previous versions, go to the file in Dropbox web-portal and click on the three dots for the file for which you want to see the previous versions.
Click on Version History option.
This will show you all the versions of that file. You can open and download this version from DropBox.
In case you have installed the DropBox folder on your system and keep your files there, you can simply right click on any of the files and click on Version History.
Doing this will take you to the web version of DropBox where you can see and download all the versions of the file.
Precautions to Enable Easy Recovery of Unsaved Files
While Excel has some default settings that make sure you have good chances of recovering Excel files, it’s still a good practice to make sure everything is enabled.
Enable AutoSave and AutoRecover
To make sure Excel automatically save your files and show recovery options, you need to have these enabled.
Although it should be enabled by default, in case it’s not, you can do that manually.
Below are the steps to enable AutoSave and AutoRecover functionality in Excel:
Let me quickly explain what these options mean:
Note: If you have a huge file with lots of formulas and charts, saving it every 5 minutes will lead to recalculation and some possible system freeze. If you don’t want that, you can choose a longer time duration (or can change calculation mode to manual).
Automatically Create a Backup Copy of the Saved Excel File
While Autosave and Autorecover options are useful when you forget to save the files and system crashes, auto-backup is something which creates a copy of the file whenever you save it.
For example, if I am working on a file with the name Test.xlsx and I save it in a folder, this would automatically create a copy with the name – ‘Backup of Test.xlk’
Now, whenever I save the Test file, all the changes are also saved in the backup copy.
This can be useful if you make some changes in a saved file and want to undo it. In that case, you can use the backup copy instead.
Or if your file crashes or gets corrupt, you will have the backup copy which will have the last saved content.
Below are the steps to enable the auto-backup feature for a workbook:
Now, whenever you save this file, an exact copy will be saved with the pre-fix ‘Backup of’.
Here are a few important things you need to know about using this auto-backup functionality in Excel:
Automatically Save a Time-Stamped Copy of the Excel Workbook
While all the methods covered so far rely on the Excel in-built features, you can also use a short VBA code to make sure you don’t lose your work ever.
With a VBA code, you save a timestamped copy of your Excel file as soon as you save it (or close it).
This ensures that you always have all the previous versions and you can go back and recover a file in case you mess up. Also, since these are time-stamped, you can easily find which version you want (or where you messed up).
Below is the code that will create a timestamped copy of the workbook as soon as you save it:
Note that you have to specify the location of the folder where you want to save the backup copies (change the path highlighted in bold in the above code).
This may mean that you end up with a lot of copies, but it can be a huge life-saver when you’re working on critical projects.
You can use a similar code to save a copy before you close the workbook (instead of saving a copy every time you save).
You need to put this code in the ThisWorkbook code window.
To do this, open the VB Editor (keyboard shortcut – ALT + F11) and double click on the This Workbook object in the project explorer.
Repairing Corrupt Excel Files
In case you find yourself with a corrupt Excel file, there are a few things you can do.
First and foremost, you can use the repair option that’s in-built in Excel.
Below are the steps to recover a corrupt file by repairing it:
If you’re lucky, everything would go smooth and you’ll be able to recover your data from the corrupt file.
In case repair option doesn’t work, follow the above steps till Step 5, and then instead of Repair, click on ‘Extract Data’. Excel will ask you whether you want to ‘Convert to values’ or ‘Recover Formulas’.
You can try using whatever option works for you. Excel will try and extract as much data as it can, and create a new workbook with the extracted data.
If this also doesn’t work. you may have to rely on third-party tools to recover corrupt Excel files.
You May Also Like the Following Excel Tutorials:
Change the recovery key for an on-premises data gateway
Starting with the November 2019 version of the on-premises data gateway (version 3000.14.39), you can change the recovery key that you specified during gateway installation.
The gateway uses the recovery key to create additional keys that encrypt data source and connection credentials. For more information about encryption, see When working with the on-premises data gateway, how are recovery keys used and where are they stored? in the Power BI security whitepaper.
When you change the key, the process depends on whether you’re using the gateway with Power BI or with another service:
For Power BI, credentials for connections that use the gateway are automatically encrypted again with the new key.
For other services, like Power Apps and Power Automate, connections aren’t automatically encrypted with the new key. You must edit each connection to trigger encryption with the new key.
Change the recovery key
Use the following steps to change the recovery key.
Open the on-premises data gateway app and sign in. If you have multiple gateway member in a cluster, you must sign into the primary member.
On the Recovery Keys tab, select Set new recovery key. In a cluster with more than one member, this action disables all other gateway members. You re-enable these members later in this process.
Enter the current recovery key and the new one.
Select Configure to change the recovery key. This step performs a recovery of the gateway and encrypts all Power BI data source credentials using the new recovery key.
After you’ve created the new key, the app shows that there is now a secondary or legacy recovery key. The gateway maintains both keys on the machine where it’s installed, so connections that use the legacy recovery key do not fail. If you want to delete the legacy key, see Delete the legacy recovery key.
If you have a gateway cluster with more than one member, perform an uninstall and recovery for each gateway member. The recovery process will ask for both the old and the new key.
If you use the gateway with services other than Power BI, edit each connection to trigger encryption with the new key.
Delete the legacy recovery key
After you’ve created a new recovery key, you can delete the legacy recovery key. Before deleting the legacy key, make sure all connections using the gateway have had their credentials encrypted with the new key.
Open the on-premises data gateway app and sign in. If you have multiple gateway member in a cluster, you must sign into the primary member.
On the Recovery Keys tab, select Delete legacy recovery key.
Каковы сообщения об ошибках по умолчанию на английском языке для политик паролей Windows?
В частности, я просматривал MSDN и Technet, пытаясь найти сообщение об ошибке по умолчанию на американском английском языке, используемое Windows для следующих параметров политики учетной записи:
У кого-нибудь есть ссылки на то, что они есть. Я немного ленивый и пытаюсь не устанавливать их, ломать их и записывать сообщения об ошибках! Мой Google-Foo подвел меня сегодня.
2 ответа 2
Строки, связанные с паролем
В следующей статье Microsoft приведен список распространенных сообщений об ошибках входа в систему, а также краткое объяснение: Вход в рабочую станцию. Он был написан для Windows 2000, но все еще может применяться.
Текстовый дамп
Сделай это сам
Откройте файл с помощью ResHacker и просмотрите раздел « Таблица строк» и / или « Таблица сообщений », в зависимости от того, что доступно. Вы также можете нажать Ctrl + F, чтобы найти конкретные слова.
Повторите шаги 2-3 по мере необходимости.
Примечание. Для получения правильных файлов может потребоваться некоторое предположение.
Data Recovery
When Aseprite is running, it saves some temporary data to restore your sprite in case that your computer (or Aseprite) crashes, or you close Aseprite without saving your sprites. (Even if you save your sprites, the original backup is kept in your disk at least for a couple of weeks.)
Open Sprites from Previous Sessions
To restore a sprite from previous sessions you have to use the «Recover Files» option in the «Home» tab:
If Aseprite crashes (wasn’t closed correctly) and some sprite wasn’t saved, you will see the «Recover Files» option as a button:
This option opens the «Recover Files» tab, where you can double-click an item (or select it and press «Recover Sprite») to recover a sprite from previous sessions:
Preferences
In the Edit > Preferences > Files section you can configure how the backup data is saved and for how long:
Internals
The backup data is saved in a subfolder named sessions inside your Preferences Folder:
sessions might contain several subfolders (one for each execution of Aseprite):
The name of these folders (e.g. 20180405-165510-1128 ) has a meaning, which is YYYYMMDD-HHMMSS-PID :
Each of these folders contain useful data to restore some sprites that you might have lost in the crash.
Everything you need to know about your 12-word secret recovery phrase
You often hear people in the cryptocurrency ecosystem use terms like «seed phrase», «12-word seed», «12 word phrase», «12 words backup», «24 words backup», «mnemonic phrase», «recovery seed» etc. If you have ever wanted to learn more about these magical words, Exodus has you covered!
This article covers the most basic aspects of these magical words which ultimately control the keys of your crypto kingdom.
In this article:
What is a secret recovery phrase?
The 12-word secret recovery phrase is the master key generated by your wallet. If you have already read our article about private keys, you’ve learned that each wallet’s receive address has its own private key which is used to make transactions and prove ownership of the funds in the address. All your private keys in Exodus are generated from and tied to the 12-word phrase.
These words help you recover your funds in case your computer crashes or anything else happens which prevents you from accessing your wallet on the computer it is installed on.
How to store your Exodus 12-word secret recovery phrase
Write down the secret phrase on a piece of paper or print them out using a secure network printer. It is always advised to have multiple copies of your secret phrase and store it in multiple locations to prevent loss from calamities like floods, earthquakes, fires, etc. For more tips on your 12-word secret recovery phrase safety, check out our article: The Do’s and Don’ts of 12 Word Phrases and Private Keys.
Ensure that you write down the secret phrase in the correct order without any spelling mistakes! Exodus tags each word of your secret phrase with the order in which it needs to be written down, so make sure you follow the order. Entering the secret phrase incorrectly (wrong order or spelling) will result in you not being able to access your wallet.
Following are some of the most common places where your secret phrase must not be stored: the notepad of your computer, as images on your laptop/mobile/tablet etc., file-sharing services like Dropbox, MegaBox, OneDrive, Google Drive, iCloud etc., e-mail drafts, word/excel/ppt files, password-protected files, USB drives, etc.
The threats are digital and online, so the best way to protect them is by keeping them in analog and offline storage: good old-fashioned paper.
How is a secret recovery phrase generated?
A simple explanation of how secret phrases work is that the wallet has a list of words taken from a dictionary, with each word assigned to a number. The secret phrase can be converted to a number which is used as the seed integer to a deterministic wallet that generates all the key pairs used in the wallet.
Exodus uses the English-language wordlist of the BIP39 standard which has 2048 words. If the phrase contained only 12 random words, the number of possible combinations would be 2048^12 = 2^132, meaning 2 to the power of 132, and the phrase would have 132 bits of security.
However, some of the data in a BIP39 phrase is not random, so the actual security of a 12-word BIP39 seed phrase is only 128 bits. This is approximately the same strength as all Bitcoin private keys, so most experts consider it to be sufficiently secure. If you want to learn more about how big 2^128 is, you can have a look here: http://bugcharmer.blogspot.com/2012/06/how-big-is-2128.html
When your 12-word phrase is converted into a seed integer or number for your wallet, the seed integer is used with a standard derivation algorithm, or formula, to derive and generate your master private key.
From this master private key, a very large number (almost infinite for all practical purposes) of private and public keys can be derived with the standard derivation formula. Given that the same master private key is used with the derivation formula, the same private and public keys will always be generated.
Also, different blockchain assets have different starting points in the derivation formula, which prevents differing assets from generating overlapping keys.
It is important to understand that the seed doesn’t represent the private key, but it is used to derive your private and public keys to a series of processes described in the following Bitcoin Improvement Proposals (BIPs):
This is a rather lengthy and technical bit of reading, but below is a basic summary.
BIP32: Describes how to use a master private key to generate (derive) a bunch of child private keys. These child keys are guaranteed to be 256-bit because of the process that is used to derive them.
BIP39: Describes how a seed is generated. Although the 12-word seed is 128-bit, the derivation process described in BIP32 will ensure that the child keys are 256-bit, but the randomness (entropy) of those keys will be equal to 128-bit.
BIP44: Describes a derivation path. In basic terms, it sets the properties that are used to derive private keys as described in BIP32. These properties, for example, can indicate what type of coin this is (BTC, BCH etc.).
What is an 18- or 24-word secret recovery phrase?
Exodus will only generate a 12-word secret recovery phrase to back up your wallet. However, other wallets might generate 18-word or 24-word secret recovery phrases. For example, the Trezor Model T automatically generates a 12-word phrase, while the Trezor One creates a 24-word phrase.
Although 12-, 18-, or 24-word secret recovery phrases all provide excellent security, some platforms choose a 24-word phrase because it provides 256-bit security rather than the 128-bit offered by the 12-word phrase. If you want to dive into the math, you could start with this video about 256-bit security or this article about cryptographic algorithms.
Also, keep in mind that different wallets use different derivation paths. Exodus and Trezor both use the BIP39 standard. However, other wallets like Electrum use an older incompatible standard. This means that a 12-word phrase from an Electrum wallet can’t be used with Exodus or Trezor.
Where does Exodus store the 12-word secret recovery phrase?
Your 12-word phrase is stored in an encrypted manner on the device you install Exodus on. We do not store your secret phrase on our servers, nor do we have any access to it. This is done in the true spirit of cryptocurrency that gives full control of the funds to the owner of the Private Keys. As Andreas Antonopoulos’ famous quote goes: «Your keys, your bitcoin. Not your keys, not your bitcoin».
Also, by doing this, we protect you in the event of a hack on our servers. The hacker wouldn’t find any information that gives access to your wallet and funds.
However, this means that you are solely responsible to ensure the safety and security of these words; if you ever forget your password and lose the secret phrase, your funds are irretrievable! We cannot help you by recreating your recovery phrase or resetting your password as we do not store anything on our end.
Using the 12-word secret recovery phrase
If you have to absolutely access the forked/airdropped tokens it is recommended to create an additional wallet where your funds can be stored until the fork/airdrop date. This way you can move your funds back to the original wallet while being able to use the new (temporary) wallet’s 12-word secret recovery phrase or private keys to access the airdropped/forked tokens.
Security of your wallet
The online world can be a dangerous place and simply keeping your secret phrase safe is not always enough. Malware-infected computers can render your wallet vulnerable and susceptible to theft! Our article How do I keep my money safe? dives deep into keeping your computer safe and offers tips for safe online browsing.
How do I view my 12-word secret recovery phrase?
Desktop:
3 a) Click on the Backup tab at the top of your wallet then b) click on View.
Do not reveal the 12 words if you are in a public location, on public WiFi, or if there is a chance anyone can see your screen.
4 A warning will display and you will need to confirm you want to see your 12-word Secret Phrase. Confirm that you understand the risks and have checked your surroundings then when you are ready, a) click the checkbox and b) click Show Secret Phrase.
5 Write down your 12-word secret recovery phrase. Mouse over the words and write them down in the correct order. Double-check that they are spelled correctly. When you are finished writing down the 12-word phrase, put it in a secure place that only you can access and click Done.
We recommend writing down your secret phrase on more than 1 piece of paper, keep the copies in separate secure locations to prevent a single point loss from events like fires, loss, etc.
6 Finally, you will need to confirm that you have written down the 12-word phrase correctly. a) Read the verification question carefully, and b) select the correct answer, then c) click Done.
Mobile:
2 Tap Backup.
Make sure nothing and no one is around to see your secret phrase. Tap View Secret Phrase if you are ready and able to write your secret 12-words down on a piece of paper and store them in a secure and private location.
We recommend writing down your secret phrase on more than 1 piece of paper, keep the copies in separate secure locations to prevent a single point loss from events like fires, loss, etc.
4 To see your 12-word secret recovery phrase, a) leave your finger on the Press and Hold to Reveal button to see your 12-word phrase. Once you have written down your 12 words, b) tap Done.
5 Next, to check your backup, you will receive a question regarding the 12-word phrase you have written down. a) Choose the correct answer to the question, b) then tap Done.
Web3 Wallet
2 Click Back Up.
3 To confirm you want to view your 12-word secret recovery phrase, a) enter your password and b) click Next. Make sure no one can see your screen, because anyone with your 12-word phrase can steal your funds.
4 You can now view your 12-word phrase by clicking Reveal phrase. Write down your 12-word phrase and store it in a secure place to you always have access to your funds. Be sure to double-check that the words have been written down in the correct order and that no words are misspelled.
We recommend writing down your 12-word secret recovery phrase on more than one piece of paper, and keeping the copies in separate secure locations to prevent a single point of loss from events like fires, floods, etc.
5 After you have written down your 12-word phrase, and checked that all the words are spelled correctly and are in the correct order, you can click Next.
Thanks for the feedback There was a problem submitting your feedback. Please try again later.
- Ensei kenja no isekai life
- Enter backup code instagram