Vulnerability Development mailing list archives
Re: local security workaround through IE
From: mtinberg () MADISON TEC WI US (Mark Tinberg)
Date: Thu, 6 Apr 2000 09:43:33 -0500
At work we used to keep a copy of AntiCMOS around for just these cases (they don't bother to protect the CMOS so sometimes users decide to make a few changes, then password it). I would imagine that if you could read from the floppy after the OS is loaded you could run your own program to remove the password from CMOS memory, then reboot, no cracking of the case required. Our new motherboards (Intel) have a jumper to reset the CMOS so I haven't had to use this, but you get the idea.
Bluefish <11a () GMX NET> 04/05/00 07:34AM >>>Well, no. Say you are at a library; the BIOS is protected by a password.. place is busy, people around you, librarians watching.. are you going to be able to open up the case, reset the BIOS (even via other methods), boot a disk, circumvent the security? No.
Current thread:
- Re: local security workaround through IE, (continued)
- Re: local security workaround through IE Jason Brvenik (Apr 03)
- Re: local security workaround through IE Andrew Bennieston (Apr 08)
- Re: local security workaround through IE Javor Ninov (Apr 05)
- Re: local security workaround through IE Wertheimer, Ishai (Apr 06)
- Re: local security workaround through IE Mr Jason C Hill (Apr 06)
- Award BIOS passwords (was Re: local security workaround through IE) Robert A. Seace (Apr 06)
- Re: Award BIOS passwords (was Re: local security workaround through IE) jnzero (Apr 07)
- Kill BIOS dEStr0YEr (Apr 08)
- Re: Kill BIOS Greg Rice (Apr 08)
- Re: local security workaround through IE Mr Jason C Hill (Apr 06)
- Re: Award BIOS passwords (was Re: local security workaround through IE) Bluefish (Apr 08)
- Re: local security workaround through IE Jason Brvenik (Apr 03)