KON-BOOT – A Computer Prank Password-Bypass Tool

Ads by Google

Pranks are fun and rewarding.  They require creativity, planning, and execution, making them much more personal than another type of joke.  A good prank can take months or even years to plan, but these are usually on a large scale and take the effort of many people to execute.

Unfortunately, we all do not have the time or resources for such endeavors. Therefore, most people focus on small pranks between friends to get our fill of shenanigans.

Computer pranks are the easiest and one of the most fun small scale pranks. Getting on someone’s computer and changing their background, messing with their desktop, or changing their homepage can lead to a good laugh, granted the person is a good sport.


But getting onto someone’s computer when they are not around can be a tall task.  Most people have passwords on their machines, thwarting any would-be pranksters.

Well, this problem can be solved with a small tool called KON-BOOT. Rather than cracking a Windows password, KON-BOOT bypasses it and lets you into the computer without typing one in. Then, when you restart, everything is back to normal, that is, everything you didn’t change for the computer prank.

Editor’s note: MakeUseOf does not encourage using this tool for malicious purposes.

To get KON-BOOT, go to their website here.

Ads by Google

Scroll down to the following for the download that will boot Windows.

computer pranks

Download either the CD ISO or floppy image. For most uses, the CD will be just fine.

You will have to unzip the downloaded file and then burn the CD image or copy the floppy Image. After that is done, you are ready to start the pranking fun.

Wait until a friend leaves his computer and make sure you have enough time to get the deed done. Pop in the CD and turn on the computer, making sure you boot from the CD.  This may require you to hit F12 at the BIOS screen and choose to boot from the CD.  You’ll know you’re there when you see the following.

computer pranks

At any time, hit Enter and you should see an ASCII art logo draw onto the screen and a few loading dialogs that should look something like this.

computer pranks

The computer should then boot Windows and, if everything worked, you shouldn’t be prompted for a password.  Now you’re ready to do your computer prank.

For good-hearted jokes, I’d advise not doing anything devastating like messing with the system registry or files.

My favorite is to do a screen shot of the desktop (Justin also had it listed in his article Four Funny Ways To Prank Your Parents With The Family Computer).  Open Paint, paste the screenshot, save it, and set it as the desktop background.  Then hide the task bar and icons.  An unsuspecting victim will think their computer has frozen.

You could also set the desktop background to a blue screen while hiding the taskbar and icons.

Both of these usually freak out the victim, but are easily reversible, so no harm is done.

After you’ve finished your dirty deeds, you can just take out your disk and reboot the computer.  It will boot as normal, with your playful changes waiting to be discovered.

KON-BOOT is a powerful tool and should be used with discretion.  Clearly, it could be used for malicious purposes, but no one like a malicious person.

A computer prank like the one described above though can lead to a good laugh.  If your victim is a good sport, hopefully you’ll both be laughing about it!

I should mention that KON-BOOT also works with some Linux distributions, but the process is a little more involved than with Windows.  To find those steps, refer to the KON-BOOT website.

Go off, trick your friend, have fun, and stay out of trouble!

Know any other good cyber-prank tools?  Let us know in the comments below.

Join live MakeUseOf Groups on Grouvi App Join live Groups on Grouvi
Windows Troubleshooting
Windows Troubleshooting
27 Members
Windows_10
Windows_10
33 Members
Windows Hacks & Customization
Windows Hacks & Customization
46 Members
Best Windows Software
Best Windows Software
28 Members
Ads by Google
Comments (21)
  • Mark Lockley

    Again with BSOD, save an image of a BSOD, save it on the computer in an unlikely place to find and point the screensaver pictures to it, when the screensaver kicks in, it appears to have crashed hehe. Or changing the clicks right and left to vice versa in control panel – mouse – (switching primary and secondry buttons) is fun to watch. Or rotating the desktop 180 degrees if the graphic card allows it is funny……maybe some tape covering the bottom of the mouse blinding the laser, rendering it temporary useless is another. I’m sure I could think of more :-)

  • Shel

    I’m not a bug fan of censorship, either. But there has to be some sort of borderline. I hope you wouldn’t tolerate someone publishing how to build a bomb, or a review for software that “as a prank” forcibly formats one’s hard drive – but only for a chuckle, of course! It’s always funny until it happens to you.

    • Mike Fagan

      Just the use of this article does no damage to a system. In fact, this software does the least damage to a system out of most other solutions to bypassing a password just in the fact that it doesn’t change a password. Sure it can be used to cause some damage, but so can a browser, regedit, or even an OS disk!

      If this software were to do dome sort of damage to the system, then I would definitely not write an article that features it as a prank tool.

  • WTH

    I finally had a chance to read the rest of the thread.

    There are some excellent comments mentioned.

    I guess my main beef with this article was the context. I don’t believe in censorship or the “head-in-the-sand” approach. Information must be shared. As JK mentions, framing this article as security piece rather than a April Fools prank would have made more sense.

    While I have no definitive proof, mostly speculation on my part having been in IT for a few years, I suspect some less-savvy computer people will be searching the net for April Fools prank ideas and stumble upon this. They will attempt to use it….which opens the proverbial pandora’s box.

    I’m not saying that KON-BOOT doesn’t have it’s place in an IT person tool box….it’s a powerful tool. I was simply asking if the greater repercussions were weighed.

    I guess one good thing…at least KON-Boot does get flagged by antivirus software, so that keeps it in check.

    Also, I would also like to see some articles on strong security as well. That would beneficial to all readers.

    • Mike Fagan

      The context of the article was a call on my part as the writer. I chose to feature KON-BOOT as a prank tool because that is how I would use it. Clearly it has other uses, but I chose to put in it a frame I felt most comfortable with. Sure, some non-tech savvy users will likely read this article, but hopefully they will have sense enough to not go into someone’s system and mess it up entirely. To not publish this article because some people may use it for bad or use it improperly would be cheating those who wanted to use a tool like this for such a good heated prank.

  • Bob Constans

    Leaving aside the morass of moral and ethical questions that have so far occupied the comments, I had this idea that I thought would really make for a good prank – use a screenshot of a different OS! Imagine your friend’s astonishment as he tries to grasp how his Windows system turned into a Mac or Linux! Now THAT would make a good funny story.

  • ænon1mus

    By not publishing this article, it would be regarded as censorship. Is ignorance bliss? I don’t consider it to be. I’d rather know this tool is out there so that I can do something about it.

Load 10 more
Affiliate Disclamer

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

For more details, please read our disclosure.
Affiliate Disclamer

This review may contain affiliate links, which pays us a small compensation if you do decide to make a purchase based on our recommendation. Our judgement is in no way biased, and our recommendations are always based on the merits of the items.

For more details, please read our disclosure.