home *** CD-ROM | disk | FTP | other *** search
/ NetNews Usenet Archive 1992 #20 / NN_1992_20.iso / spool / comp / sys / ibm / pc / hardware / 23892 < prev    next >
Encoding:
Text File  |  1992-09-10  |  899 b   |  22 lines

  1. Newsgroups: comp.sys.ibm.pc.hardware
  2. Path: sparky!uunet!timbuk.cray.com!hemlock.cray.com!kak1
  3. From: kak1@cypress31.cray.com (Kevin Kramer)
  4. Subject: Re: Bypass AMI bios passwd protect needed
  5. Message-ID: <1992Sep10.095951.3418@hemlock.cray.com>
  6. Originator: kak1@cypress31
  7. Lines: 9
  8. Sender: kak1@cypress31 (Kevin Kramer)
  9. Organization: Cray Research, Inc.
  10. References: <1992Aug27.115612.2944@csdvax.csd.unsw.edu.au> <iroderic.715713297@cunews> <1992Sep9.214835.8760@sbcs.sunysb.edu>
  11. Date: 10 Sep 92 09:59:51 CDT
  12.  
  13.  
  14. In article <1992Sep9.214835.8760@sbcs.sunysb.edu>, ppatel@csws8.ic.sunysb.edu (Prashant M Patel) writes:
  15. >     You can bypass the AMI bios by holding down the <INS> key while
  16. >     turning on the power. This should reset the password to AMI. If
  17. >     that does not work then you can disconnect the battery to the CMOS.
  18. >                     
  19. Doesn't this completely defeat the purpose of password protection?
  20.