Logon to ANY SYSTEM
Let's address each level of security:
A) BIOS passwords
-Remove small battery from Motherboard and wait a few (10 min) for the capacitors to drain (unplug CPU). Then reboot. During reboot or at BIOS Password screen find BIOS make/version (Phoenix/AMI etc) and download a "Flash" BIOS update to USB or floppy.
-Use floppy to flash BIOS and bypass, modify BOOT path to add USB
-No floppy drive? boot from CD/DVD (ISO image...see instructables)
Never hack what you can access. Boot from USB/CD-ROM and load your OWN OS from these devices. Login to your OS and "mount" the systems root disc, C: drive or other partitions.
Browse all their files....
C) Encrypted files (EFS)
Easy ! see http://support.microsoft.com/kb/255742/en-us and backup their private key, run EFSinfo.exe and set your NEW OS to the same Workgroup or Domain as the target. Then browse the files.
Any ideas protection or passwords that can block this?
D) Linux/UNIX is secure!
UNIX & linux systems simply change their Init levels to boot as root recovery (standalone/Admin/Single User = init 1) recovery console allows access to Boot options, load CD/USB OS boot and mount original file systems. Browse or add login to /etc/password and login or telnet/VNC/SSH etc...
Protect your console! Lock & Block all USB, CD & DVD access.
Use dongle or hardware key!
Use NON-OS based encryption and PGP or DES standards!