TIP: Click on subject to list as thread! ANSI
echo: 80xxx
to: BRYAN SCHWARTZ
from: SCOTT MCNAY
date: 1998-03-28 08:41:00
subject: CMOS

 *** Bryan Schwartz wrote in a message to Scott Mcnay:
BS> So i quess there is no way to save the CMOS information when
BS> it is 'protected' by an unknown password unless its a
BS> Packard Bell? That could be a problem.
Packard Bell computers aren't the only ones that have password jumpers; 
that's merely the one that comes to mind, because I've looked at so many of 
them.
If you can boot up the computer, you can save the entire CMOS, but if you put 
it all back in, you also restore the password.  If you want to put it back in 
without the password, ask someone else in here about calculating the checksum 
fields.   The problem is that most BIOSes have at least two checksum fields, 
and the second field isn't necessarily in the same place on all systems.
If you have an AMI BIOS, you can find a copy of AMISETUP.  I don't know if 
it'll work with AMI WinBIOS, but it does work with AMI FlexBIOS.  With it, 
you can change everything that's available, including items that are avilable 
in the BIOS but are disabled by the manufacturer, for whatever reason.
--Scott.
--- timEd 1.01
---------------
* Origin: Wizard's BBS, 254-554-2146, Pager=dead ;( (1:395/11)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.