No users on machine

My MacBook Pro froze up earlier today -- the screen was completely frozen. So, I held down the power button to reboot. When it rebooted, the login screen came up fine, but it won't let me login -- keeps giving me the "wrong password" shake. I thought the login password had somehow become corrupted, so I booted from the CD and went into the "Reset Password" tool. Problem is: there are no users listed -- my login name (srrodger) is gone. The only user listed is the System Administrator (root), and the help documents in the support section say not to touch that one.
I have a backup of the data, so I'm not all that concerned about losing something. But, how can I login to the machine? It appears to me there are no users on the machine.
Thanks in advance.

Thanks a ton for the quick response. Steps 1 and 2 did not work, so I followed steps 1 and 3. I then re-created the user (srrodger), using the same password. That worked and I am able to login. All of the apps are there, but I cannot access the Documents or Library folders. The only user name on the system is srrodger, but when I go into \Users\srrodger\ and try to access those folders, I get the message: "The folder 'Documents' could not be opened because you do not have sufficient access privileges."
I have repaired permissions, and also ran Disk Warrior. Neither fixed the problem. Any suggestions?
Thanks again.

Similar Messages

  • Iphoto can not be open by different users on Machine, why? OSX Maverick

    I photo is working very well for one user but is not possible to start for the other user on machine.

    Have solved the problem myself. Upgrade was in the tools map, not in program.

  • Problems to avoiding local copy in the user's machine

    Hi All,
    I implemented the BadI DOCUMENT_FILES01~AFTER_START_APPL according to the wiki http://wiki.sdn.sap.com/wiki/display/PLM/Avoidinglocalcopyoforiginal for avoid local copy of original in the user's machine.
    This implementation only works for originals open through the ECL Viewer or MS Office Integration, avoiding local copy of originals in this cases.
    But the problem is that PDF files still being copy to temporary folder in the user's machine when I use ECL Viewer 6.0 with patch 5 implemented according to SAP note 1380587.
    If I implement the patch 5 for ECL Viewer 6.0 without the manually customizing in "Enviroment Variables" indicating in the solution section of the SAP note, then the PDF files are not copy to temporary folder in the user's machine.
    In test with ECL Viewer 5.1.2 and 5.1.3, this problem with PDF Files doesn't happen too.
    My system and customizing information:
    SAP GUI 710 PATCH 18
    ECL 6.0 with all patches installed 1 to 7 according to the SAP notes
    Data carrier
           - Define mount points/logical drive => Data Carrier: PC; Data Carrier Type: PC; Prefix for access path: PC
           - Define data carrier type "server, front end" => Data Carrier Type: PC; Description: local PC; path: c:\temp\
    Has anyone experienced this?
    Best Regards,
    Daniel

    Hi Daniel,
    regarding the display or handling of PDF files I have to say that here the local copy is required by the Adobe Reader and therefore the system has to made a local copy to display the PDF files correctly. This happens also if you display PDF files with the ECL Viewer because also the viewer requires an instance of the Adobe Reader which again needs a local copy. So for displaying PDF files a local copy is mandatory.
    Best regards,
    Christoph

  • Arial embedded font displaying jumbled on another user's machine

    I have a PDF document that uses an Arial embedded font and it looks fine on my machine, but looks like this on one of my end user's machines:
    In researching this problem all the advice points to a problem with the font, but it's just the common Arial font and it is listed as embedded. Or at least, I think it is, Arial shows up in the font list for the PDF properties 3 times, and if I use the Touchup Text tool, select the text and look at Properties, it says "Cannot embed font" although both embed and subset checkboxes are checked and disabled.
    Can anyone help please?
    -VG_mnet
    P.s. I should have mentioned that it shows jumbled on my machine too when the user emailed it to me.  I'm on Adobe Pro version 9.
    Here is the font list on the PDF properties:

    Thank you again for your help Bill@VT and CtDave.  I did play around with the Distiller but I don't think those options help me much since I do not use either of the options to create the PDF that you mention Bill.  I actually am usually starting with an existing PDF template (that has our logos and a demo title) and then I fill in the rest of the paragraphs, charts, labels and form fields.  So my understanding (now that I have explored) is that the Distiller is used for converting a postscript file to a pdf.  I already have a PDF tho.  Just for yuks, I saved my PDF as a .ps and ran it through the distiller - it correctly embedded all my fonts, but my form fields were all gone. 
    So I moved on to Plan B and looked at the preflights that Dave referred to.  After looking at a lot of instructional web pages that all told me the Preflights were of the View or Tools menu, I finally found it under Advanced->Print Production->Preflights.  I chose the option to Embed fonts (even if text is invisible), and ran it through.  It seemed to work great and maintained my form fields.  Most of my fonts are also now embedded as I had hoped.  I think this will be the way we move forward with all the existing PDFs we have in our system, but I did notice that one font still didn't get embedded.  One of the Arial's (the 1st CID in the screenshot above) is still listed as not embedded even though the other fonts listed are practically identical and are embedded.  This may be a problem on just this one PDF, and the other PDFs in my system appear to not have this issue when I run the preflight, so I'll keep playing with this one PDF, but does anyone have a theory as to why the preflight wasn't able to embed that one CID font?
    Thanks again! You have both been helpful and I've learned some new tricks!
    -VG

  • 802.1x Wireless - Enforce user AND machine authentication

    I am using ACS v5.6 and I'd like to confirm that it is not possible to enforce both user and machine authentication against AD before allowing wireless access to Windows 7 clients, using PEAP/MSCHAPv2 and the built-in 802.1x supplicant.
    The only workaround seems to involve MAR (Machine Access Restrictions), which has pretty significant drawbacks.
    I'd rather not have to deploy user and machine certificates.
    All I want to do is allow access to the wireless network only if the device and the user are in AD.
    It's such a simple scenario that I must be missing something.
    Any suggestions are welcome. Thanks in advance for your comments.
    Lucas

    In my opinion, the only solution that works is using NAM and EAP-Chaining with ISE as radius backend, last time i looked in ACS release notes was 5.4, and it didn't have eap-chaining support.
    Using the built-in windows supplicant will only authenticate user or machine at any time, not both. As you discovered, the feature called MAR used to be what was being recommended (mostly because nothing else existed), What most people miss when they say this will work fine with windows supplicant and acs, is the fact that you cannot be sure that when the user authenticates, he is doing it from an authenticated machine, this is mainly due to the shortcomings.of MAR. You should consider migrating to ISE if you are not using any TACACS features on ACS.

  • EAP-TLS User and machine authentication question

    Hello,
    i have a question regarding EAP TLS authentication in a wireless environment. We use Cisco AnyConnect NAM client and an ACS 5.1 to do EAP-TLS authentification. The Laptop and the user can be successfully authenticated using a certificate from our internal CA. i can also check the in our corporate AD if the user and machine are member of a certain group and based on the membership a can grant access to the network.
    i can see in the ACS when the laptops after a reboot logs on to the network, but i don't see a log when the laptop comes back from hibernate mode, i guess this is normal because the laptop sends only the autentication equest after rebooting.
    What i'd like to achive is, when a user logs on the it should always be checked if the machine was authenticated prior the user can get access to the network. Is there a way to do this with EAP-TLS and a LDAP connection to Active Directory.
    thanks in advanced
    alex

    Sounds like you rather want to use PEAP/MSChapV2

  • Fetching the serial number of the user's machine

    Hi there.
    I am after a Cocoa approach to retrieving the serial number of the user's machine in my application.
    I have seen an AppleScript solution, but I was wondering if there was a more efficient Cocoa way.
    Thanks in advance,
    Ricky.

    You should not post your serial number in these forums, besides what you posted was invalid,  Post your serial number here and post back the exact model MBP you have:
    https://selfsolve.apple.com/agreementWarrantyDynamic.do
    Ciao.

  • Required settings in AD USER Client machine

    After configuring AD RMS, what are required settings in Regedit, MSIPC to encrypt the data using Templates and AD hoc policies in newly created AD USER client machine.

    Hi CK,
    Based on Your Step 2 answer template
    distribution works fine..
    Thanks for your quick answer..

  • Windows Virtual PC (VMWindow.exe) does nothing but open a dialog box labeled user "Virtual Machines"

    Windows Virtual PC (VMWindow.exe)  does nothing but open a dialog box labeled <user> "Virtual Machines"
    Running Win 7 Pro 64 bit SP1 on an Asus Z97 Pro socket 1150 mobo, with Intel VT-d both Supported and Enabled in the BIOS.

    I am attempting to use Win Virtual PC as one would use VirtualBox or VMware Player.
    I thought I stated my case clearly.
    Are you proposing that Win Virtual PC functions ONLY  to run Win XP in a virtual machine environment? 
    Bill
    No, I just suspect you would like to install XP mode on virtual machine.
    Supported guest operating systems in Virtual PC:
    •Windows XP Service Pack 3 (SP3) Professional
    •Windows Vista Enterprise Service Pack 1 (SP1) and later versions
    •Windows Vista Ultimate Service Pack 1 (SP1) and later versions
    •Windows Vista Business Service Pack 1 (SP1) and later versions *
    • Windows 7 Professional *
    •Windows 7 Enterprise.
    •Windows 7 Ultimate
    • Windows 7 Professional (SP1)*
    •Windows 7 Enterprise (SP1)
    •Windows 7 Ultimate (SP1)
    *Note  Virtual applications are not supported on Windows Vista Business or on Windows 7 Professional or on Windows 7 Professional(SP1). All other features of Windows Virtual PC are supported on these two guest systems.
    In addition, refer to this guide to create virtual PC before using:
    How to Create a New Virtual Machine in Virtual PC
    http://support.microsoft.com/kb/826291
    Kate Li
    TechNet Community Support

  • Need to ftp files(BACS) from Server to Users Local Machine-Urgent

    Hello,
    I am working on a Oracle HRMS Implementation(11i) and have a requirement wher I need to ftp files (BACS File) from a server to Users Local Machine.
    Please let me know any scripts or the way forward to achieve the same using a concurrent program.
    Thanks a lot!

    That requires the users machine for a ftp server installed and to be "visible" to the conc program server, the first one requiring setup and configure for every client and the second one may be a problem if in different segments or security policies. Another approach may be to generate the files on the server in a known location and from the client create a batch script to connect to that server and retrieve the file(s). You may schedule the program to run at certain hours or use a shortcut so the user can run it on demand

  • Sharing: 2 users, same machine... not possible, incredible (!)

    A simple question:
    2 users, same machine. My wife and Me. We both want to use the same iphoto library.
    It's on an external Hard Drive.
    Possible??

    Yes. Make sure the external HD is set to ignore ownership and formatted OS X Extended (journaled).
    Click to view full size
    Then each of you should launch iPhoto with the Option key depressed and in the next window select the library on the external HD.

  • Proxy settings moved from User to Machine not removing user settings.

    Hi All,
    I have recently moved our company's proxy settings from User based to Machine based as we were having issues after moving from an internal proxy to a hosted external proxy.  What we found was after turning off the internal some users were no longer
    getting external internet. 
    After some investigation we found they were still getting old proxy settings on login and after a GPupdate.exe or normal gpupdate from the server the correct settings would apply. (happened to users logging on for the 1st time) To prevent this from happening
    I moved the proxy settings to the Computer GPO and it all appeared to work in the test GPO and in live.  But a few days later we got some calls logged to our help desk stating they don't get external internet.  After some more
    investigation we found that they are still getting the user policy applied to them even though it has all been removed from the User GPO. 
    I found if I remove the proxy settings it doesn't always apply to users but if I add info in it always updates to the user.  What can be causing this?  Some of these users have local admin rights and I thought at first it might be something they
    did but now we are getting non admin users with these issues.
    We are using IE 10 and have set the original Proxy settings using the GUI internet control panel and are now applying the proxy settings via Registry updates in the Computer GPO and enabled "Make Proxy settings per-machine" object.  Our SOE
    is Win 7 ent x64 with IE 10 (1500 units) and Win 8.1 ent x64 IE11 (100 units) And some XP SP3 that are in the process of migrating to Win7.
    Any help on this would be much appreciated.
    Cheers,
    Nat

    Hi Nat,
    you wrote: I found if I remove the proxy settings it doesn't always apply to users but if I add info in it always updates to the user. 
    Does that also happen für new users now after you changed your settings to the computer settings?
    I guess you used group policy preferences; that worked as "one time settings", so as long as the policy exists it will be merged with the Settings on the users computer. Please find a detailed description on
    http://technet.microsoft.com/en-us/library/dn581922.aspx
    So you now have 2 configuration items: your policy as well as the users registry. So to remove that you already moved the Settings from the user configuration to your Computers configuration (that worked as you described) while the Settings
    in their HKCU are still there - you Need to either implement another  policy to remove that, or you can set it empty.
    Don't set it to "not configured" as that will keep your old setting deployed before.
    Sometimes I found in more easy to implement another user preference that removed the Registry key with the Registry keys to remove a Setting instead of Publishing a "remove Setting" configuration.
    Regards,
    Martin

  • Can I get the Mac address in Audit logs of Active directory server for the user's machine which connect to the network/Domain

    Hello All,
    I am trying to get the information of all the user's who connect to our Domain network by signing in using the domain account. For this I am using the Windows audit group policies ( I am not sure of there is any other way). I can see when the user tries
    to login to the network there is a audit event created on the AD/DC server. I can see the Kerberos authentication and logon/logoff events in the audit events under event viewer.  
              However the info which is being populated in these events include :- Hostname, IP address, Username and so on... But I can't see the MAC address of the user machine/system. Is there any way I can
    get the Mac address of the endpoint system as its one of the important criteria for our project.
    Any inputs on this would be appreciated, incase if there is any other way other than group policies please suggest.
    Thanks,
    Kavish

    > include :- Hostname, IP address, Username and so on... But I can't see
    > the MAC address of the user machine/system. Is there any way I can get
    > the Mac address of the endpoint system as its one of the important
    > criteria for our project.
    If you use DHCP, you can query the DHCP server. There's no builtin
    method to get the MAC address directly.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Can't "Add Accounts" for second User on machine

    Just upgraded from my G4 running 10.4.x to a Mini running 10.5.2. There are two user log ins on the machine. I set up my e-mail accounts in Mail on my "side" of the machine, but my partner cannot "Add Accounts" in Mail on their side of the machine---in Mail's "File" menu, "Add Accounts" is greyed out. Any solution?

    quit Mail and move the file homedirectory/library/preferences/com.apple.mail.plist to desktop. start mail. You'll have to recreate your account. once created they'll recognize the existing mailboxes.

  • Wrong ownership on TM-- is it safe to 'sudo chown -R user Time-Machine ?

    I ran Migration Assistant by a new user "Admin" to recover the accounts of 3 users on Lion.
    After the migration, Admin owns the Time Machine history of one of the users (even though account Admin didn't even exist at the time these backups were made).
    Is it safe to run:
        sudo chown -R alex "/Volumes/Time-Machine/Backups.backupdb/Alex's MacBook/*/Macintosh HD/Users/alex"

    I ran Migration Assistant by a new user "Admin" to recover the accounts of 3 users on Lion.
    After the migration, Admin owns the Time Machine history of one of the users (even though account Admin didn't even exist at the time these backups were made).
    Is it safe to run:
        sudo chown -R alex "/Volumes/Time-Machine/Backups.backupdb/Alex's MacBook/*/Macintosh HD/Users/alex"

Maybe you are looking for

  • Variable being overwritten in the Variable Substitution (File Adapter)

    In the File adapter Receiver Communication Channel, I am using variable substitution. The problem is that the first variable I use (userid) is being overwritten by the second variable (filenumber). How can I fix this problem? File Name Scheme: %useri

  • Column text cuts in the printable view

    I have a af:table inside a af:panelCollection. Some columns in the table contains clickable links. Since it should also support printable behavior I have defined table like this. <af:table value="#{someBean.data}" var="row" rowBandingInterval="0" id=

  • Error in compiling a custom dictionary for text analysis

    I got a error when I tried to compile the custom dictionary for the Text Data Processing transformor. I am looking for help to solve the problem or work around the error. The error is as follows: [ERR] Can not create file [C:/ws_sclg.1] Here is the c

  • Object lock for table T001B / view V_T001B (tcode OB52)

    Hi, The table T001B or view V_T001B is for Opening and Closing FI periods. We have given the transaction to Business users who are located in various parts of the world. During month end each user is trying to open the period for his company. However

  • Making Relicated objects appear more random

    Here's what I've got: A circle shape, fill turned off and outline turned on and thickened, brush type changed to airbrush, opacity of brush altered to have a light middle surrounded by dark front and trailing off to a dark back, and Rate behavior use