Skip to main content

How to fix: NTLDR is missing, press any key to restart

 You're working with your workstation (or laptop) and suddenly rebooted of it's own. After the reboot, you see the NTLDR is missing, press any key to restart, or the other famous Windows OS error \system32\hal.dll is missing or corrupt. Don't worry it's not the end of the world. I have a solution to share. I've done this to some workstations and laptop.

Create a CD bootable disk. You can also create a bootable disk using floopy or USB but I will not discuss it here. I prefer to use CD boot disk which is common to laptop or workstation.
  • Download this file from Tinyempire.com website. Again this is only for CD boot disk.
  • Extract the file to your temp folder. Here you will see a file with the iso extension.
  • Now let's Copy to Image or Burn ISO file to create the bootable disk. After this task, you now have a CD boot disk.
Use the CD disk to boot your workstation or laptop. Make sure you press the F12 button to boot in a CD not the hard disk. When you boot to a CD, you have 10 selection to try to fix your NTLDR issue.

1ST TRY THIS seleccione esto primero
2ND TRY THIS essayez ceci en deuzieme
3RD TRY THIS wahlen Sie diesen Third
4TH TRY THIS selezioni questo fourth
5TH TRY THIS selecione este fifth
6TH TRY THIS seleccione este sexto
7TH TRY THIS essayez ceci en septieme
8TH TRY THIS wahlen Sie dieses achte
9TH TRY THIS selezioni questo nono
10TH TRY THIS selecione este decimo

Of course, when you boot to CD let's start using the 1ST TRY THIS if this doesn't work. Restart the computer again and choose the second option, and so on till you see the Windows login screen again.

When you successfully boot to your computer. Open Windows Explorer, copy the following files (boot.ini, ntldr, and ntdetect.com) to your C:\ drive. Just over write the existing files, they don't work anyway.

Let's test our action, reboot your computer and see if you can login. If yes, we are in good direction to fix your computer.

Now let's configure your computer to use the default system startup.
  • Click Start, Control Panel
  • Click to Classic View, double click System
  • In System Properties, click on Advanced tab
  • In Advance, click Settings
  • In Startup and Recovery, Default Operating System, select the one we use to boot.
  • Put Check in Time to display list of operating systems, and select 1 second.
  • Click OK
When you restart your computer, it will automatically boot to your default operating system. We're done, it's time to backup your data.

Reference: Tinyempire.com or Ntldrmissing.com

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp