home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.ibm.pc.hardware
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!usc!newshub.sdsu.edu!chemteca.sdsu.edu!massoud
- From: massoud@chemteca.sdsu.edu (Massoud Ajami)
- Subject: Re: program to erase AMI BIOS passwd
- Message-ID: <massoud.79.715383550@chemteca.sdsu.edu>
- Lines: 29
- Sender: news@newshub.sdsu.edu
- Nntp-Posting-Host: 130.191.227.22
- Organization: San Diego State University
- References: <1992Aug30.165031.2971@csdvax.csd.unsw.edu.au> <180i5aINN396@matt.ksu.ksu.edu>
- Date: Tue, 1 Sep 1992 21:39:10 GMT
-
- In article <180i5aINN396@matt.ksu.ksu.edu> psb@matt.ksu.ksu.edu (Jr Phillip S Buckland) writes:
- >From: psb@matt.ksu.ksu.edu (Jr Phillip S Buckland)
- >Subject: Re: program to erase AMI BIOS passwd
- >Date: 1 Sep 1992 15:00:42 -0500
- >u2116318@csdvax.csd.unsw.edu.au writes:
- >
- >>The problem solved, and I wrote a com file
- >>to do this , if you can still boot from froppy
- >>then you can use this program to change the
- >>checksum of cmos data, so next time when
- >>you reboot the machine, the computer
- >>will say bios checksum error, and then
- >>all you previeus setup is gone include (passwd)
- >
- > Looks like lots of trouble to go to. On later releases of AMI
- > BIOSes, all you have to do to reset the CMOS is to press and hold
- > the INS key when powering up. The CMOS parameters are then reset
- > to their factory defaults.
- >
- >
- >We read the world wrong | Phil Buckland
- >and say that it deceives us. | psb@eece.ksu.edu
- >Tagore, from Stray Birds | psb@matt.ksu.ksu.edu
-
- But not password, otherwise there would be no security!
-
-
- Peace and Prosperity!
- ---==< 110 >==---
-