• JohannesOliver@beehaw.org
        link
        fedilink
        arrow-up
        1
        ·
        2 years ago

        For a while vendors tried to lock down the BIOS pretty hard. Dell might still, I remember having to call and get assistance when a password was forgotten and they had to generate a backdoor key of some sort. Maybe that is less of a thing now that Bitlocker is widely used on corporate laptops and it is sensitive to tampering.

    • PenguinTD@lemmy.ca
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      yeah, I did that in my high school years.(80386~80486 years). The jumper reset is neat cause you can then set the school computer to boot from floppy first instead of booting from whatever source it was set to.

      So, how tf you have access to MB? Well, if you are much better at computers than most teachers at school, naturally they let you “help” doing the maintenance(aka, figure out what’s wrong, replace parts etc). I did those free labour so I can play some games during school hours, so that’s a fair trade.

  • bouncing@partizle.com
    link
    fedilink
    arrow-up
    4
    ·
    2 years ago

    BIOS passwords have only ever been to deter unsophisticated attacks. Though this is more unsophisticated than the rest.

        • cmnybo@discuss.tchncs.de
          link
          fedilink
          arrow-up
          1
          ·
          2 years ago

          Most motherboards store the password in SRAM along with all of the other BIOS settings. Removing or shorting the backup battery will clear everything.

          Some motherboards store the password in non volatile memory. That’s usually done in computers intended for business use. If you forget the password, you have to get a reset code from the manufacturer after proving that you are the owner of it.

  • Zaytalion@partizle.com
    link
    fedilink
    arrow-up
    2
    ·
    2 years ago

    It’s even more trivial to remove the hard drive and read/write it directly, possibly even booting it on a separate system directly or in a virtual machine. BIOS passwords (on all x86 systems, not just Lenovo) provide very limited security benefits, but they can be sufficient for some basic security requirements.

    • Moonrise2473OP
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      Well right now it’s more secure than a decade ago

      Today a locked BIOS + strong windows password could render a stolen computer almost useless if:

      1. Storage is encrypted with keys stored in the CPU tpm (default)

      2. Nand is soldered

      3. Secureboot is enforced strictly so only windows could boot (default)

      4. Before locking the bios with a password, all booting options are disabled except internal storage