No need to apologize, you can ask as many questions as you want.
But you seem to be discovering a lot of hacking tools on the Internet, and then you have questions about that specific tool you just discovered.
This process can go on without ever ending, there are just too many hacking tools out there. To try to break out of this endless loop, you should try to understand how these tools work, and what protection mechanisms Windows offers.
Last time I used the Ophcrack Live CD it did not boot on UEFI, and I just checked the authors page and there is no mention of a new release with UEFI support.
Tools like Ophcrack use the following technique: they recover the encrypted passwords from the Windows files that contain them, and then they try to crack the encrypted passwords (by trying out a huge amount of potential passwords).
A good way to protect yourself from these tools, is to make sure that they can not read the required Windows files from disk.
Preventing booting is one solution that you identified seeing the questions that you ask, but another solution is to prevent file reading by using full disk encryption.
Then even if someone manages to boot (because you can not only boot from USB, but also from CD/DVD and network), they can not read the disk (preventing attacks like Ophcrack) but also not change the files (preventing attacks with password-reset disks).
SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.
Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"