Re: Laptop Password.

From: G. Chomic (secure.computing@gmail.com)
Date: Sat Jul 01 2006 - 12:58:30 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Satelite 6xxx series Toshiba's.

Remove power, battery. After doing so, hold down the power button for
30 seconds. It sets BIOS to default, including the password. Simply
having a bad/exhausted CMOS battery won't, incidentally - the password
is remembered even if all other settings are forgotten on that model.

That probably doesn't help this case, but it might for others.

YMMV,
Gabe

Jacob Weeks wrote:
> I've had to refurb panasonic laptops before, and they have a special
> cable you need to connect from the ps2 port to the com1 port (been a
> few years there, might be off), with the correct pinout blows out a
> boot password. They gave us the directions to create the cable, they
> didn't sell it or give it to us.
>
> Dell might have somthing similar.
>
>
> On 6/28/06, Nervox <nervox@gmail.com> wrote:
>> Greetings
>>
>> Part of a small audit i did in the company some laptops are found to
>> have a password(either PoP or just to change values in the BIOS).On a
>> desktop most of the time all you need is to take out the battery to
>> get rid of it, but for laptops (DELL in this case) i know that it is
>> in (if memory serve correct) an EPROM.In case of theft i know that the
>> PoP will protect form a casual thief but i know first hand that DELL
>> has a backdoor system , they send the serial number to the mother
>> company (always wanted to say that) they check if it stolen and if not
>> they send a password to be entered.
>> Now is there a possibility that someone has created a generator for
>> these password?Is it known ? I mean security throughout obscurity (if
>> you can call it like this in this case) is obviously something that i
>> wouldn't trust.
>>
>> Any comment /Ideas?
>>
>> Best Regards Nervox
>>
>> ------------------------------------------------------------------------------
>>
>> This List Sponsored by: Cenzic
>>
>> Concerned about Web Application Security?
>> Why not go with the #1 solution - Cenzic, the only one to win the
>> Analyst's
>> Choice Award from eWeek. As attacks through web applications continue
>> to rise,
>> you need to proactively protect your applications from hackers. Cenzic
>> has the
>> most comprehensive solutions to meet your application security
>> penetration
>> testing and vulnerability management needs. You have an option to go
>> with a
>> managed service (Cenzic ClickToSecure) or an enterprise software
>> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>> help you: http://www.cenzic.com/news_events/wpappsec.php
>> And, now for a limited time we can do a FREE audit for you to confirm
>> your
>> results from other product. Contact us at request@cenzic.com for details.
>> ------------------------------------------------------------------------------
>>
>>
>>
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEpqm2ZEPQmWb53voRAmK0AJ93Gu5gNKmfEDVL4zSwbNwUvIUc/QCbBRgC
e3zH1fVzUrVcHkeDAh/rRAE=
=jm/n
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:12 EDT