On Monday 21 April 2008 02:34:24 pm Bart Pittari wrote:
> Found that already - they were trying it as I was typing this message.
>
> Doubtful that they'll be able to contact the original owner.
>
> I did find a Dell BIOS pass killer but (ironically) it's in a password
> protected rar file.
>
> On Mon, Apr 21, 2008 at 2:30 PM, Mischa D. Krilov <rossum@gmail.com> wrote:
> > On Mon, Apr 21, 2008 at 2:12 PM, Bart Pittari <pittari@gmail.com> wrote:
> > > It is a BIOS password - they disconnected the hard drive and got the
> >
> > same
> >
> > > thing.
> >
> > Just checking.
> >
> > I've since stumbled across this:
> >
> > http://www.cgsecurity.org/wiki/CmosPwd
> >
> > ..which may or may not work for the Dell.
> >
> > You may be looking at a jumper short, or simply waiting to contact the
> > original owner.
> >
> > Mischa
> > --
> > Read my blog: http://rossum.blogspot.com
> > ___________________
> > Nolug mailing list
> > nolug@nolug.org
Well heres the scoop from what ive gathered, because im combating dell for a
bios password also. Theres an EEPROM chip that holds the settings even if you
disconnect the battery, currently there are no generators for the 'master
keys' that i know of, there is one for latitudes, but not insperion. There is
a chance if you cut V+ on the EEPROM chip that it will allow you to boot, but
I don't really know much of it. From what I know, you might be SOL unless you
go 'the dell way'
-- Linux cs-net 2.6.24-ARCH #1 SMP PREEMPT Sun Mar 30 11:40:06 CEST 2008 i686 Intel(R) Pentium(R) 4 CPU 2.40GHz GenuineIntel GNU/Linux
___________________
Nolug mailing list
nolug@nolug.org
This archive was generated by hypermail 2.2.0 : 12/19/08 EST