Deze versie is geschreven door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Haswell*/Broadwell-present processor has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] | |
''*Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.'' | |
***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these questions. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) and the 1st-4th gen Intel Core i (AMD from the same period) is almost always locked due to negligence from a fleet decom. The odds of an old machine like this being stolen are very low, and most people acquire these from places like eBay, recyclers, and GovDeals/GovPlanet. If this were newer, I would not have answered this.''***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
''*In some cases with older models, the hard drives are high hour/have an issue. In those cases, I will replace the drive with an SSD if the laptop is nice enough to warrant it or only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).''***[br] | |
***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; we all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). If someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation), I'm taking a chance. | |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set," you are done but do check the other passwords to be sure.*** | |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
- | ***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity |
+ | ***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity since the seller did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, the Computrace issue is resolved.*** | |
[quote|format=featured] | |
***Here's how you tell: If rcpnet.exe in process=active, Absolute SW needs to terminate the tracking. If the machine has no presence of rpcnet.exe, it was done beforehand.*** | |
***Bear in mind once it's enabled on the pre-PK 2.0 Dells, you cannot disable it; but it will no longer be active.*** | |
[/quote] | |
[quote|format=featured] | |
***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** | |
[/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Haswell*/Broadwell-present processor has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] | |
''*Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.'' | |
- | ***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these questions. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) and the 1st-4th gen Intel Core i (AMD from the same period) is almost always locked due to negligence from a |
+ | ***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these questions. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) and the 1st-4th gen Intel Core i (AMD from the same period) is almost always locked due to negligence from a fleet decom. The odds of an old machine like this being stolen are very low, and most people acquire these from places like eBay, recyclers, and GovDeals/GovPlanet. If this were newer, I would not have answered this.''***[br] |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
''*In some cases with older models, the hard drives are high hour/have an issue. In those cases, I will replace the drive with an SSD if the laptop is nice enough to warrant it or only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).''***[br] | |
***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; we all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). If someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation), I'm taking a chance. | |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set," you are done but do check the other passwords to be sure.*** | |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, the Computrace issue is resolved.*** | |
[quote|format=featured] | |
***Here's how you tell: If rcpnet.exe in process=active, Absolute SW needs to terminate the tracking. If the machine has no presence of rpcnet.exe, it was done beforehand.*** | |
***Bear in mind once it's enabled on the pre-PK 2.0 Dells, you cannot disable it; but it will no longer be active.*** | |
[/quote] | |
[quote|format=featured] | |
***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** | |
[/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Haswell*/Broadwell-present processor has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] | |
''*Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.'' | |
- | ***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) |
+ | ***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these questions. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) and the 1st-4th gen Intel Core i (AMD from the same period) is almost always locked due to negligence from a decommissioned fleet of machines. The odds of an old machine like this being stolen are very, very low, and most people acquire these from places like eBay, recyclers, and GovDeals/GovPlanet. If this were newer, I would not have answered this.''***[br] |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
''*In some cases with older models, the hard drives are high hour/have an issue. In those cases, I will replace the drive with an SSD if the laptop is nice enough to warrant it or only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).''***[br] | |
- | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; |
+ | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; we all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). If someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation), I'm taking a chance. |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set," you are done but do check the other passwords to be sure.*** | |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** | |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, the Computrace issue is resolved.*** |
+ | [quote|format=featured] |
+ | ***Here's how you tell: If rcpnet.exe in process=active, Absolute SW needs to terminate the tracking. If the machine has no presence of rpcnet.exe, it was done beforehand.*** |
+ | |
+ | ***Bear in mind once it's enabled on the pre-PK 2.0 Dells, you cannot disable it; but it will no longer be active.*** |
+ | |
+ | [/quote] |
[quote|format=featured] | |
***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** | |
[/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Haswell*/Broadwell-present processor has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] | |
''*Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.'' | |
***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would not have answered this.''***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
''*In some cases with older models, the hard drives are high hour/have an issue. In those cases, I will replace the drive with an SSD if the laptop is nice enough to warrant it or only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).''***[br] | |
- | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). |
+ | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). If someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation), I'm taking a chance. |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set," you are done but do check the other passwords to be sure.*** | |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, you're done with that issue (Hint: rcpnet.exe in process=active, no rcpnet.exe=disabled). You won't be able to disable it like the PK 2.0 BIOS-integrated version Dell uses now, but once it's off, it's off.*** | |
[quote|format=featured] | |
***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** | |
[/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password but ***BEWARE: Anything with a Haswell* |
---|---|
+ | Dell laptops use a master password, but ***BEWARE: Anything with a Haswell*/Broadwell-present processor has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] |
''*Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.'' | |
***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would not have answered this.''***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
''*In some cases with older models, the hard drives are high hour/have an issue. In those cases, I will replace the drive with an SSD if the laptop is nice enough to warrant it or only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).''***[br] | |
***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). I'm taking a chance if someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation).*** | |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set," you are done but do check the other passwords to be sure.*** | |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, you're done with that issue (Hint: rcpnet.exe in process=active, no rcpnet.exe=disabled). You won't be able to disable it like the PK 2.0 BIOS-integrated version Dell uses now, but once it's off, it's off.*** | |
[quote|format=featured] | |
***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** | |
[/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password but ***BEWARE: Anything with a Haswell*, Broadwell, or newer has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] | |
- | |
+ | ''*Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.'' |
***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would not have answered this.''***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
- | |
- | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). |
+ | ''*In some cases with older models, the hard drives are high hour/have an issue. In those cases, I will replace the drive with an SSD if the laptop is nice enough to warrant it or only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).''***[br] |
+ | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). I'm taking a chance if someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation).*** |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
- | I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set" you are done |
+ | I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set," you are done but do check the other passwords to be sure.*** |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** | |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, as the government destroys drives. Once Absolute Software severs the activation, you're done with that issue (Hint: rcpnet.exe in process=active, no rcpnet.exe=disabled). You won't be able to disable it like the PK 2.0 BIOS-integrated version Dell uses now, but once it's off, it's off.*** |
[quote|format=featured] | |
***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** | |
[/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password but ***BEWARE: Anything with a Haswell*, Broadwell, or newer has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] | |
****Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.*** | |
***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would not have answered this.''***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes and be done with it. Use my new laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** | |
** ***Having to wait for it to arrive to the seller*** | |
** ***get a refund*** | |
** ***Look again*** | |
***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] | |
****In some cases with older models, the hard drives are high hour/have an issue. In those cases I will replace the drive for an SSD if the laptop is nice enough to warrant it or it only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).***[br] | |
***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). If someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation) I'm taking a chance.*** | |
***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** | |
I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set" you are done, but do check the other passwords to be sure.*** | |
[quote|format=featured] | |
***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** | |
***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** | |
[/quote] | |
***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** | |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, being the gov't destroys drives. Once the activation is severed by Absolute Software (Hint: rcpnet.exe in process=active, no rcpnet.exe=disabled). You won't be able to disable it like the PK 2.0 BIOS integrated version Dell uses now, but once it's off it's off. Install a throwaway copy of Windows on it for this purpose and then fully erase it again once it's gone to make sure you do not run into an easily avoided issue.*** |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, being the gov't destroys drives. Once Absolute Software severs the activation, you're done with that issue (Hint: rcpnet.exe in process=active, no rcpnet.exe=disabled). You won't be able to disable it like the PK 2.0 BIOS integrated version Dell uses now, but once it's off it's off*** |
+ | |
+ | [quote|format=featured] |
+ | ***DON'T USE the copy of Windows where it was active if it wasn't removed before you got it! Consider the initial installation disposable and ONLY USE IT TO GET RID OF THE COMPUTRACE AGENT! This is the only way to avoid any Computrace issues.*** |
+ | |
+ | [/quote] |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked-in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] |
---|---|
- | ***''PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would have not answered this.''***[br] |
- | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED.*** |
+ | Dell laptops use a master password but ***BEWARE: Anything with a Haswell*, Broadwell, or newer has an option in the BIOS to block the master password reset. If it's enabled, you have to replace the motherboard!***[br] |
+ | ****Some Haswell business systems had it added retroactively. Ivy Bridge and older is permanently cracked wide open.*** |
+ | |
+ | ***''PLEASE READ: If you see this and ask about a newer computer, I am usually apprehensive to touch these. For the M4400, I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would not have answered this.''***[br] |
+ | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED, EVEN ON THE NEWER "NO TOUCH" LAPTOPS I WILL NOT DO HERE.*** |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
- | * ***Remove it in 5 minutes and be done with it. Use new laptop.*** |
- | * ***Start a return, spend ~1-2 hours getting there (or paying for |
- | ** ***wait for it to |
+ | * ***Remove it in 5 minutes and be done with it. Use my new laptop.*** |
+ | * ***Start a return, spend ~1-2 hours getting there (or paying for an Uber)*** |
+ | ** ***Having to wait for it to arrive to the seller*** |
** ***get a refund*** | |
** ***Look again*** | |
- | ***For locked units, if I'm getting it cheap over this I make sure it's decom old and get the price to match the condition as CYA. When I am alone I will unlock both the Admin and POP passwords and see how to deal with the HDP (if it's present). Once all of this is done, I'm personally wiping the data on the laptop for peace of mind. Sometimes the hard drives are goners if I get one, but that's why I account for it in the unit price; especially ones I know probably use Seagate hard drives. If you knew how to do this, would you not do the same and crack these locked laptops to avoid a headache or score high-end versions cheap?***[br] |
- | ***Essentially what I do applies to ANY TRADE someone knows how to win the lottery and can take home high-end equipment for pretty much nothing.*** |
+ | ***For locked units, if I'm getting it cheap over this issue, I either make sure it's decommissioning age (or there's a reason, such as company closure/downsizing) and get the unit at a price low enough as CYA. When I am alone and can get it done, I'm already working on the BIOS Admin/HDP passwords (as needed). Once I know the BIOS is unlocked, I will erase ALL of the hard drives/SSDs to be sure I am starting over clean*.***[br] |
+ | ****In some cases with older models, the hard drives are high hour/have an issue. In those cases I will replace the drive for an SSD if the laptop is nice enough to warrant it or it only takes SSDs. That said, I always account for it and assume the worst in my offer (especially on machines I know come with Seatrash/Seagate hard drives as the "common drive" of choice).***[br] |
+ | ***BEFORE ANYONE CALLS ME OUT: Let's say you were a mechanic (or know how to work on cars) and you saw someone sell a Lexus/BMW/Audi/Mercedes cheap due to a $50-100 problem the seller assumes is a thousand-dollar issue. Would you not take advantage of that and be able to drive around in an S550/S600, even an E class, if you didn't like the cost of fixing the Airmatic suspension? It's the same in IT; We all laugh at it and know it's an idiot deterrent (seriously, we cover for this in the AUP). If someone is offloading an easily unlocked Precision with the i7 and high-end graphics (Radeon Pro/RTX workstation) I'm taking a chance.*** |
- | [br] |
- | ***Here's the thing: In IT, we know all too well and openly laugh at how quickly we can break in and score i7 Precisions over this "issue", the problem to check for is Computrace. Dell also knows, which is why they don't fix it after we got into the series in question wide open. Once we're in, WE ARE IN. This is also why it's garbage tier security as well, even Dell knows this. Sadly, they had to introduce the master lockout because someone complained loud enough. We don't care if it's easy, we cover it in the AUP under the "security configuration" ;). For everyone else outside IT, they know we can get it done so it's not like it's a shock I'm able and willing to open up one of these locked laptops if I know it's not stolen and it's not bricked by that stupid master lockout. Throw the right model at the risk-to-reward factor like a 17" Precision? Am I going to say no? NOPE. If you have an issue, do not ask or do not get involved with me breaking it. It's also a semi-common job on "decommed" units anyway due to IT incompetence.*** |
+ | ***However, the big issue (and this is why I offer accordingly) is Computrace. It's a non-issue on old machines, but you may need ownership info if it's newer.*** |
- | I'm not going to provide links, but there's a site that can generate it if you look (but the ST MUST MATCH, uppercase and lowercase). On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it, and then press Shift+Enter on these. Once that's done, go under security and make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password. Once done, it's done; you can usually get rid of all of them including the HDP but this sometimes requires a unique key not shared by the Admin and POP. I ran into that permanent commitment quirk on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard.''***[br] |
- | ***''I happily cracked it at the risk of a future return denial because the spec is desirable and I know how to do it without tampering with the hardware (that said I would do the same on the IGP units as well, but my point stands). When I got in, I showed them the issue (not the method!) and told them I'm fine because I'm in but to check carefully next time.''*** |
+ | I'm not going to provide links, but there's a site that can generate it if you know where to start (***Note: the ST MUST MATCH, uppercase, and lowercase)***. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12 to get into the OTBM), then enter the master password to unlock the system. ***Once Admin (under "Security options") says "Not set" you are done, but do check the other passwords to be sure.*** |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being Persistence 1.0, sadly. 2.0 (Absolute Computrace PK can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
+ | [quote|format=featured] |
+ | ***NOTE: On the Core 2 series and older, you often need to either commit the change under "Admin" in "Security options" for it to clear, others may not need this. However, these usually require the extra step of pressing SHIFT+Enter, not just Enter. It depends on the generation and series.*** |
+ | |
+ | ***This should wipe out all of the passwords (Admin/POP/HDP) but you often have to remove the HDP independently unless the master password nukes all 3, so double check in that case.*** |
+ | |
+ | [/quote] |
+ | ***''I ran into the issue where you need to clear it for good by removing it under Security on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard who did not check. I chose to crack it vs return it for the reasons mentioned above and to avoid the hassle (at some risk of not being able to return it, but I took it due to the specs).''*** |
+ | |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway, being the gov't destroys drives. Once the activation is severed by Absolute Software (Hint: rcpnet.exe in process=active, no rcpnet.exe=disabled). You won't be able to disable it like the PK 2.0 BIOS integrated version Dell uses now, but once it's off it's off. Install a throwaway copy of Windows on it for this purpose and then fully erase it again once it's gone to make sure you do not run into an easily avoided issue.*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked |
---|---|
- | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough |
- | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN |
+ | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked-in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] |
+ | ***''PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough that this laptop was legally acquired. If this was a newer system, I would have not answered this.''***[br] |
+ | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN AND "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED.*** |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
- | * ***Remove it in 5 minutes |
+ | * ***Remove it in 5 minutes and be done with it. Use new laptop.*** |
* ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** | |
** ***wait for it to show*** | |
** ***get a refund*** | |
** ***Look again*** | |
- | ***For locked units, if I'm getting it cheap over this I make sure it's decom old |
+ | ***For locked units, if I'm getting it cheap over this I make sure it's decom old and get the price to match the condition as CYA. When I am alone I will unlock both the Admin and POP passwords and see how to deal with the HDP (if it's present). Once all of this is done, I'm personally wiping the data on the laptop for peace of mind. Sometimes the hard drives are goners if I get one, but that's why I account for it in the unit price; especially ones I know probably use Seagate hard drives. If you knew how to do this, would you not do the same and crack these locked laptops to avoid a headache or score high-end versions cheap?***[br] |
***Essentially what I do applies to ANY TRADE someone knows how to win the lottery and can take home high-end equipment for pretty much nothing.*** | |
[br] | |
- | ***Here's the thing: In IT, we know all too well and openly laugh at how quickly we can break in and score i7 Precisions over this "issue", the problem to check for is Computrace. Dell also knows, which is why they don't fix it after we got into the series in question wide open. Once we're in, WE ARE IN. This is also why it's garbage tier security as well, even Dell knows this. Sadly, they had to introduce the master lockout because someone complained loud enough. We don't care if it's easy, we cover it in the AUP under the "security configuration" ;). For everyone else outside IT, they know we can get it done so it's not like it's |
+ | ***Here's the thing: In IT, we know all too well and openly laugh at how quickly we can break in and score i7 Precisions over this "issue", the problem to check for is Computrace. Dell also knows, which is why they don't fix it after we got into the series in question wide open. Once we're in, WE ARE IN. This is also why it's garbage tier security as well, even Dell knows this. Sadly, they had to introduce the master lockout because someone complained loud enough. We don't care if it's easy, we cover it in the AUP under the "security configuration" ;). For everyone else outside IT, they know we can get it done so it's not like it's a shock I'm able and willing to open up one of these locked laptops if I know it's not stolen and it's not bricked by that stupid master lockout. Throw the right model at the risk-to-reward factor like a 17" Precision? Am I going to say no? NOPE. If you have an issue, do not ask or do not get involved with me breaking it. It's also a semi-common job on "decommed" units anyway due to IT incompetence.*** |
- | I'm not going to provide links, but there's a site |
- | ***''I happily cracked it at the risk of a future return denial because the spec is desirable and I know how to do it without tampering with the hardware (that said |
+ | I'm not going to provide links, but there's a site that can generate it if you look (but the ST MUST MATCH, uppercase and lowercase). On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it, and then press Shift+Enter on these. Once that's done, go under security and make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password. Once done, it's done; you can usually get rid of all of them including the HDP but this sometimes requires a unique key not shared by the Admin and POP. I ran into that permanent commitment quirk on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard.''***[br] |
+ | ***''I happily cracked it at the risk of a future return denial because the spec is desirable and I know how to do it without tampering with the hardware (that said I would do the same on the IGP units as well, but my point stands). When I got in, I showed them the issue (not the method!) and told them I'm fine because I'm in but to check carefully next time.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being Persistence 1.0, sadly. 2.0 (Absolute Computrace PK can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this.***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED.*** | |
***The reason I will do this (especially unadvertised password issues) is I can either:*** | |
* ***Remove it in 5 minutes, be done with it. Use laptop.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** | |
** ***wait for it to show*** | |
** ***get a refund*** | |
** ***Look again*** | |
- | ***For locked units if I'm getting it cheap over this I make sure it's decom old, then negotiate down as CYA, unlock the Admin and POP passwords, see how to deal with the HDP (if it's present) and then wipe the HD to know I did it. Sometimes the hard drives are goners, but that's why I account for it and |
- | *** |
+ | ***For locked units, if I'm getting it cheap over this I make sure it's decom old, then negotiate down as CYA, unlock the Admin and POP passwords, see how to deal with the HDP (if it's present), and then wipe the HD to know I did it. Sometimes the hard drives are goners if I get one, but that's why I account for it and test it, but the price is as if I need to replace it after 5 years, especially newer Seagate era Dells! If you knew how to do this, would you not do the same and crack these surprise locked BIOSes, or score high-end versions for cheap over something anyone who is aware can deal with?***[br] |
+ | ***Essentially what I do applies to ANY TRADE someone knows how to win the lottery and can take home high-end equipment for pretty much nothing.*** |
- | |
- | ***'' |
+ | [br] |
+ | ***Here's the thing: In IT, we know all too well and openly laugh at how quickly we can break in and score i7 Precisions over this "issue", the problem to check for is Computrace. Dell also knows, which is why they don't fix it after we got into the series in question wide open. Once we're in, WE ARE IN. This is also why it's garbage tier security as well, even Dell knows this. Sadly, they had to introduce the master lockout because someone complained loud enough. We don't care if it's easy, we cover it in the AUP under the "security configuration" ;). For everyone else outside IT, they know we can get it done so it's not like it's an unknown thing I'll scoop up a locked i7 Radeon Pro 17" Precision if I don't see an issue with the master lockout. ABSOLUTELY NOBODY WHO KNOWS ME would be shocked if I was getting into an old Dell with a surprise password problem, or one I scooped up due to lack of knowledge how. It's a semi-common job on "decommed" units anyway due to IT incompetence.*** |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being Persistence 1.0, sadly. 2.0 (Absolute Computrace PK can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
+ | I'm not going to provide links, but there's a site which can generate it if you look (but the ST MUST MATCH, uppercase and lowercase). On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it, and then press Shift+Enter on these. Once that's done, go under security and make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password. Once done, it's done; you can usually get rid of all of them including the HDP but this sometimes requires a unique key not shared by the Admin and POP. I ran into that permanent commitment quirk on an NVS 160M 256MB (900p direct LED motherboard) E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard.''***[br] |
+ | ***''I happily cracked it at the risk of a future return denial because the spec is desirable and I know how to do it without tampering with the hardware (that said, I would do the same on the IGP units as well, but my point stands). When I got in, I showed them the issue (not the method!), told them I'm fine because I'm in but to check carefully next time.''*** |
+ | |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop, and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being Persistence 1.0, sadly. 2.0 (Absolute Computrace PK can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this.***[br] | |
- | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. |
+ | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD WHEN IT IS MISSED.*** |
- | * ***Remove it (5 minutes), be done with it.*** |
+ | ***The reason I will do this (especially unadvertised password issues) is I can either:*** |
+ | |
+ | * ***Remove it in 5 minutes, be done with it. Use laptop.*** |
* ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** | |
** ***wait for it to show*** | |
** ***get a refund*** | |
** ***Look again*** | |
- | ***For locked units make sure it's decom old, negotiate as CYA, unlock |
- | ***The amount of us who break in rather than say no are so common being called out for it is like pointing out a needle in a haystack; saying that I reset a Dell with a BIOS password is like saying water is wet. Nobody will be shocked |
+ | ***For locked units if I'm getting it cheap over this I make sure it's decom old, then negotiate down as CYA, unlock the Admin and POP passwords, see how to deal with the HDP (if it's present) and then wipe the HD to know I did it. Sometimes the hard drives are goners, but that's why I account for it and treat it as optimistic trash. If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" or take the deal and run? Exactly, it's like saying someone who knows how to work on a classic car would buy it even with common issues a fix is known for, but it was sold due to the amount of issues by a non-DIY owner.***[br] |
+ | ***Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". It goes both ways, too by the way; Dell knows we know how (yet leaves our way in easy to decrypt, and open) but had to introduce the master lockout because someone complained loud enough. The IT department knows this too (we cover against it in the AUP under the "security configuration" clause), and anyone who plays on eBay knows how as well. The amount of us who break in rather than say no are so common being called out for it is like pointing out a needle in a haystack; saying that I reset a Dell with a BIOS password is like saying water is wet. Nobody will be shocked (outside of the people who were lied to). Even then as they hit decom age, the need to do this becomes more common anyway; if there's a way in and someone wants it gone buy the laptop and do the work in the car AFTER they leave.*** |
I'm not going to provide links, but there's a site which can generate it if you look (but the ST MUST MATCH, uppercase and lowercase). On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password. Once done, it's done; you can usually get rid of all of them including the HDP but this sometimes requires a unique key not shared by the Admin and POP. I ran into that permanent commitment quirk on a E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard.''***[br] | |
***''The reason I happily cracked it at the risk of a future return denial is the spec is desirable and I know how (that said, I would do the same on the IGP units as well, but my point stands). I showed them the issue (not the method!), told them don't worry I'm in and to be more careful because some buyers don't know what to do, and will demand a return for this.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being Persistence 1.0, sadly. 2.0 (Absolute Computrace PK can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this.***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. For unadvertised password issues I can either:*** | |
* ***Remove it (5 minutes), be done with it.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** | |
** ***wait for it to show*** | |
** ***get a refund*** | |
** ***Look again*** | |
- | ***For locked units make sure it's decom old, negotiate as CYA, unlock laptop, wipe dump HD if I cannot unlock it to prevent issues (swap if this happens), get cheap Dell. If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". Dell knows we don't take the security seriously (and will still happily leave the way in there, but had to appease people with the master lockout) and just get in there, IT knows (and lies to users or covers it in the AUP), and anyone who plays on eBay knows all too well it can be done. We don't care if we get labeled for buying these locked Dells because this happens more often than you think, too - especially at decommission time!*** |
+ | ***For locked units make sure it's decom old, negotiate as CYA, unlock laptop, wipe dump HD if I cannot unlock it to prevent issues (swap if this happens), get cheap Dell. If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". It goes both ways, too by the way; Dell knows we know how (yet leaves our way in easy to decrypt, and open) but had to introduce the master lockout because someone complained loud enough. The IT department knows this too (we cover against it in the AUP under the "security configuration" clause), and anyone who plays on eBay knows how as well.***[br] |
+ | ***The amount of us who break in rather than say no are so common being called out for it is like pointing out a needle in a haystack; saying that I reset a Dell with a BIOS password is like saying water is wet. Nobody will be shocked -- even then as they hit decom age, the need to do this becomes more common anyway; why not take advantage of their security theater?*** |
- | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password |
- | ***''The reason I happily cracked it (I would do the same |
+ | I'm not going to provide links, but there's a site which can generate it if you look (but the ST MUST MATCH, uppercase and lowercase). On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password. Once done, it's done; you can usually get rid of all of them including the HDP but this sometimes requires a unique key not shared by the Admin and POP. I ran into that permanent commitment quirk on a E6400 I got from a charity I got with the NVS 160M 256MB GPU and 900p direct drive LED display and motherboard.''***[br] |
+ | ***''The reason I happily cracked it at the risk of a future return denial is the spec is desirable and I know how (that said, I would do the same on the IGP units as well, but my point stands). I showed them the issue (not the method!), told them don't worry I'm in and to be more careful because some buyers don't know what to do, and will demand a return for this.''*** |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being Persistence 1.0, sadly. 2.0 (Absolute Computrace PK can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this.***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. For unadvertised password issues I can either:*** | |
* ***Remove it (5 minutes), be done with it.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** | |
** ***wait for it to show*** | |
** ***get a refund*** | |
** ***Look again*** | |
- | ***For locked units make sure it's decom old, negotiate as CYA, unlock laptop, dump HD if I cannot unlock it to prevent issues (swap if this happens), get cheap Dell. If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". Dell knows we don't take the security seriously (and will still happily leave the way in there, but had to appease people with the master lockout) and just get in there, IT knows (and lies to users or covers it in the AUP), and anyone who plays on eBay knows all too well it can be done. We don't care if we get labeled for buying these locked Dells because this happens more often than you think, too - especially at decommission time!*** |
+ | ***For locked units make sure it's decom old, negotiate as CYA, unlock laptop, wipe dump HD if I cannot unlock it to prevent issues (swap if this happens), get cheap Dell. If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". Dell knows we don't take the security seriously (and will still happily leave the way in there, but had to appease people with the master lockout) and just get in there, IT knows (and lies to users or covers it in the AUP), and anyone who plays on eBay knows all too well it can be done. We don't care if we get labeled for buying these locked Dells because this happens more often than you think, too - especially at decommission time!*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that quirk on a E6400 I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] | |
***''The reason I happily cracked it (I would do the same fort the IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this.***[br] | |
***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. For unadvertised password issues I can either:*** | |
* ***Remove it (5 minutes), be done with it.*** | |
* ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** | |
** ***wait for it to show*** | |
** ***get a refund*** | |
** ***Look again*** | |
- | ***If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". Dell knows we don't take the security seriously (and will still happily leave the way in there, but had to appease people with the master lockout) and just get in there, IT knows (and lies to users or covers it in the AUP), and anyone who plays on eBay knows all too well it can be done. We don't care if we get labeled for buying these locked Dells because this happens more often than you think, too - especially at decommission time!*** |
+ | ***For locked units make sure it's decom old, negotiate as CYA, unlock laptop, dump HD if I cannot unlock it to prevent issues (swap if this happens), get cheap Dell. If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". Dell knows we don't take the security seriously (and will still happily leave the way in there, but had to appease people with the master lockout) and just get in there, IT knows (and lies to users or covers it in the AUP), and anyone who plays on eBay knows all too well it can be done. We don't care if we get labeled for buying these locked Dells because this happens more often than you think, too - especially at decommission time!*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that quirk on a E6400 I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] | |
***''The reason I happily cracked it (I would do the same fort the IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
- | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. For unadvertised password issues I could remove it in 5 minutes, or spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would you not get it done and keep the laptop and save a LOT of time? Exactly. When it comes to Dell, BIOS passwords are security theater. IT knows, the tinkering crowd knows, Dell knows but pretends it's more secure than it is. This issue happens more often than you think, too - especially at decommission time!*** |
+ | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this.***[br] |
+ | ***I'm not going to sugarcoat it: YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. For unadvertised password issues I can either:*** |
+ | |
+ | * ***Remove it (5 minutes), be done with it.*** |
+ | * ***Start a return, spend ~1-2 hours getting there (or paying for a Uber)*** |
+ | ** ***wait for it to show*** |
+ | ** ***get a refund*** |
+ | ** ***Look again*** |
+ | ***If you knew how to do this, would you not be like "I'm not returning this, lemme just get in and be done with it" too? Exactly. Here's the thing: In IT, we know and laugh at Dell's nonsense about how it's "secure". Dell knows we don't take the security seriously (and will still happily leave the way in there, but had to appease people with the master lockout) and just get in there, IT knows (and lies to users or covers it in the AUP), and anyone who plays on eBay knows all too well it can be done. We don't care if we get labeled for buying these locked Dells because this happens more often than you think, too - especially at decommission time!*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that quirk on a E6400 I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] | |
***''The reason I happily cracked it (I would do the same fort the IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
- | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I |
+ | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I WILL TAKE THE "BIOS LOCKED" DISCOUNT IF I KNOW THE UNIT IS NOT STOLEN OR "RESET" THE PASSWORD ON THESE LAPTOPS TO REMOVE THE PASSWORD. For unadvertised password issues I could remove it in 5 minutes, or spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would you not get it done and keep the laptop and save a LOT of time? Exactly. When it comes to Dell, BIOS passwords are security theater. IT knows, the tinkering crowd knows, Dell knows but pretends it's more secure than it is. This issue happens more often than you think, too - especially at decommission time!*** |
- | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***'' |
+ | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''NOTE: In some cases, you need to permanently commit the change on the Core 2 machines by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that quirk on a E6400 I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] |
***''The reason I happily cracked it (I would do the same fort the IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. Dell BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** | |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that quirk on a E6400 I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] | |
- | ***''The reason I happily cracked it (I would do the same fort the |
+ | ***''The reason I happily cracked it (I would do the same fort the IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. Dell BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** | |
- | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 |
+ | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that quirk on a E6400 I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] |
***''The reason I happily cracked it (I would do the same fort the 1280x800 IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. Dell BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** | |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 I thought was done I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] | |
- | ***''The reason I happily cracked it (I would do the same fort the 1280x800 IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them, told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** |
+ | ***''The reason I happily cracked it (I would do the same fort the 1280x800 IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them the issue (not the method!), told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. Dell BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** | |
- | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 I thought was done I got from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit who didn't check for this; I let it slide, and recommended they check closer because some buyers don't know what to do.''*** |
+ | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 I thought was done I got from a charity I got with an uncommon spec that is worth it when it shows up (but isn't worth significantly more): 1440x900 LED direct drive screen (1280x800 motherboards can't accept this, as they use an "inverter"+CCFL motherboard)/NVS 160M 256MB GPU.''***[br] |
+ | ***''The reason I happily cracked it (I would do the same fort the 1280x800 IGP units as well, but my point stands) is I know how, and the NVS spec is my go-to on those when I can get it. I showed them, told them don't worry I'm in and be more careful because some buyers don't know what to do, and will demand a return for this.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
- | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** |
+ | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. Dell BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 I thought was done I got from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit who didn't check for this; I let it slide, and recommended they check closer because some buyers don't know what to do.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
- | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to bypass |
+ | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to remove with the bypass, or I could spend ~1-2 hours/pay for an Uber doing a return, waiting for it to show and getting the refund and looking again. If you knew how to do this, would quickly fixing it be more appealing, or a return? Exactly. BIOS passwords are false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 I thought was done I got from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit who didn't check for this; I let it slide, and recommended they check closer because some buyers don't know what to do.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] | |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to bypass and remove, vs ~1-2 hours/pay for an Uber, drop the laptop off after starting the return, then waiting 1-2 weeks for a refund, and shopping again when I could have dealt with it myself (and I probably paid almost nothing for it if it's old). It's false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** | |
- | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set" |
+ | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says, "Not set" as well as the other security options; they all need to go. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password but once it's done, they should all be nuked, NVRAM HDP's included. I ran into that on a E6400 I thought was done I got from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit who didn't check for this; I let it slide, and recommended they check closer because some buyers don't know what to do.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop |
---|---|
+ | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop will need a motherboard replacement!***[br] |
***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to bypass and remove, vs ~1-2 hours/pay for an Uber, drop the laptop off after starting the return, then waiting 1-2 weeks for a refund, and shopping again when I could have dealt with it myself (and I probably paid almost nothing for it if it's old). It's false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** | |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop is done and you need to replace the motherboard.***[br] | |
- | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to bypass and remove, vs ~1-2 hours/pay for an Uber, drop the laptop off after starting the return, then waiting 1-2 weeks for a refund, and shopping again when I could have dealt with it myself (and I probably paid almost nothing for it if it's old). |
+ | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to bypass and remove, vs ~1-2 hours/pay for an Uber, drop the laptop off after starting the return, then waiting 1-2 weeks for a refund, and shopping again when I could have dealt with it myself (and I probably paid almost nothing for it if it's old). It's false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
- | |
- | |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptop and get it checked. If it is active, they need to disable that crap server side. You'll need a new drive and a new copy of Windows anyway being the gov't destroys drives, but once it's disabled and rpcnet.exe is dead, you're good. On yours, you can't turn it off on being a Persistence 1.0 system. 2.0 (Absolute Computrace PK, can be disabled once stopped) can be, but you're not that lucky :(. You do not want to use this laptop until it's neutralized. Once it's done, re-wipe the computer and start over with a clean copy of Windows.*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop is done and you need to replace the motherboard.*** |
---|---|
- | |
- | [br] |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.***[br] |
- | ***Just to give everyone an idea, the reason I choose to bypass it is time: I can return the older laptop I probably paid $40-50 for but I need to go to the UPS store or Fedex (1-2+ hours, possibly having to get an Uber), send it off, wait 1-2 weeks for the return and inspection, then get my money back. Or I can remove it in 5 minutes, and be done with it. Which one makes more logical sense?*** |
- | |
- | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, and you probably suspected it's easy and we know how. The sysadmin knows and considers it checkbox compliance which takes seconds to work around (we hate adding it because they're not real security, blame management). We all do it in IT at some point on Dell machines we get to keep, it's an open secret how..*** |
+ | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop is done and you need to replace the motherboard.***[br] |
+ | ***PLEASE READ: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so low I'm confident enough to answer this. If this was a newer system, I would have not answered this. YES, I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE; it takes all of 5 minutes to bypass and remove, vs ~1-2 hours/pay for an Uber, drop the laptop off after starting the return, then waiting 1-2 weeks for a refund, and shopping again when I could have dealt with it myself (and I probably paid almost nothing for it if it's old). Its false security meant to scare the minimum wage employees who used them prior to the machines being available as corporate surplus.*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
+ | |
+ | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop is done and you need to replace the motherboard.*** | |
[br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.***[br] | |
***Just to give everyone an idea, the reason I choose to bypass it is time: I can return the older laptop I probably paid $40-50 for but I need to go to the UPS store or Fedex (1-2+ hours, possibly having to get an Uber), send it off, wait 1-2 weeks for the return and inspection, then get my money back. Or I can remove it in 5 minutes, and be done with it. Which one makes more logical sense?*** | |
- | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, and you probably suspected it's easy and we know how. The sysadmin knows and considers it checkbox compliance which takes seconds to work around. We all do it in IT at some point on Dell machines we get to keep, it's an open secret how..*** |
+ | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, and you probably suspected it's easy and we know how. The sysadmin knows and considers it checkbox compliance which takes seconds to work around (we hate adding it because they're not real security, blame management). We all do it in IT at some point on Dell machines we get to keep, it's an open secret how..*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] |
---|---|
+ | Dell laptops use a master password, but ***BEWARE: Anything with a Broadwell or newer processor has a baked in Master lockout option (it was also added retroactively to Haswell systems) in firmware. If this is enabled, the laptop is done and you need to replace the motherboard.*** |
+ | |
+ | [br] |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.***[br] | |
***Just to give everyone an idea, the reason I choose to bypass it is time: I can return the older laptop I probably paid $40-50 for but I need to go to the UPS store or Fedex (1-2+ hours, possibly having to get an Uber), send it off, wait 1-2 weeks for the return and inspection, then get my money back. Or I can remove it in 5 minutes, and be done with it. Which one makes more logical sense?*** | |
- | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows |
+ | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, and you probably suspected it's easy and we know how. The sysadmin knows and considers it checkbox compliance which takes seconds to work around. We all do it in IT at some point on Dell machines we get to keep, it's an open secret how..*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.*** |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.***[br] |
+ | ***Just to give everyone an idea, the reason I choose to bypass it is time: I can return the older laptop I probably paid $40-50 for but I need to go to the UPS store or Fedex (1-2+ hours, possibly having to get an Uber), send it off, wait 1-2 weeks for the return and inspection, then get my money back. Or I can remove it in 5 minutes, and be done with it. Which one makes more logical sense?*** |
***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around. We all do it in IT at some point on Dell machines we get to keep, it's an open secret how..*** | |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.*** | |
- | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around.*** |
+ | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around. We all do it in IT at some point on Dell machines we get to keep, it's an open secret how..*** |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. The reason I choose to get in through the back is time - it takes more time to start a return vs. just removing the password.***[br] |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 (Solo/Duo/Extreme) era is thoroughly decommissioned, as well as 1st gen (Core i), up to 4th gen (Haswell, Core i), same for AMD. The odds of a Core 2 laptop being stolen are so negligible I'm confident enough to answer this. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. YES, I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A BIOS PASSWORD BEFORE. On the Dells, you generate the code and press Shift+Enter to bypass the prompt. Once it is bypassed you need to verify it says "Not set" under Admin password. FOR THOSE WHO INSIST ON PUSHING IT, THE REASON I BYPASS OLD DELL LAPTOPS WITH A BACKDOOR IS TIME! It takes longer to return vs. removing the password.*** |
+ | |
***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around.*** | |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. The reason I choose to get in through the back is time - it takes more time to start a return vs. just removing the password.***[br] | |
***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around.*** | |
- | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 unit and didn't check.''*** |
+ | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 (direct LED drive on motherboard, the 1280x800 units use an inverter and CCFL motherboard) unit and didn't check.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. The reason I choose to get in through the back is time - it takes more time to start a return vs. just removing the password.***[br] | |
***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around.*** | |
I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 unit and didn't check.''*** | |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE! Wipe the computer again, and start over so you know it's not tainted.*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the BIOS password.*** |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. The reason I choose to get in through the back is time - it takes more time to start a return vs. just removing the password.***[br] |
+ | ***The thing is BIOS passwords are mostly security theater, like the TSA. It's false security meant to scare the minimum wage employee using the system. Those who remove them know, you probably suspected it. The sysadmin knows, its checkbox compliance which takes seconds to work around.*** |
- | ***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass them in minutes. BIOS passwords are intended to deter minimum wage employees.*** |
- | |
- | I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change by typing the master code into the admin prompt under security once you bypass the password initially on the Core 2 series, which I ran into on a E6400 which I unlocked rather then returned.''*** |
+ | I'm not going to provide links, but there's a site which can generate it if you look. On Dell, you need to press F2 or F12 (select BIOS setup if you use F12, as it's the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change on the Core 2 machines like yours by typing the master code into the admin prompt under security once you initially bypass the password. Ran into that on a E6400 from a charity who sold a NVS 160M/1440x900 unit and didn't check.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the BIOS password.*** | |
***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass them in minutes. BIOS passwords are intended to deter minimum wage employees.*** | |
- | I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change by typing the master code into the admin prompt under security once you bypass the |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change by typing the master code into the admin prompt under security once you bypass the password initially on the Core 2 series, which I ran into on a E6400 which I unlocked rather then returned.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the BIOS password.*** | |
***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass them in minutes. BIOS passwords are intended to deter minimum wage employees.*** | |
- | I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***''You sometimes need to permanently commit the change by typing the master code into the admin prompt under security once you bypass the lock on the Core 2 series, which I ran into on a E6400 which I unlocked rather then returned.''*** |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the password |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the BIOS password.*** |
***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass them in minutes. BIOS passwords are intended to deter minimum wage employees.*** | |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the password when it happens.*** |
***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass them in minutes. BIOS passwords are intended to deter minimum wage employees.*** | |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE OLD LAPTOPS WHEN I GOT THEM SECONDHAND WITH A SURPRISE BIOS PASSWORD BEFORE, SO NO POINT DENYING IT. You generate the code, press Shift+Enter to be sure it takes it, see if it says "Not set" under security (if it doesn't, you use the same code there as well) and commit the change. Problem solved. It takes more time to start a return then it does to remove the damn password when it happens to begin with.*** |
- | ***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass |
+ | ***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass them in minutes. BIOS passwords are intended to deter minimum wage employees.*** |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock.***[br] |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are very, very close to zero to such a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I would have not answered this. I HAVE CRACKED THESE LAPTOPS WHEN I GOT THEM SECONDHAND WITH A UNKNOWN BIOS PASSWORD WITHOUT A CARE; GO IN, GENERATE THE CODE, DISABLE IT, SAVE THE CHANGE AND MOVE ON. I'm not going to waste time and energy returning a BIOS locked Dell when it can be defeated in 5 minutes since it's secured with a virtual Master Lock.*** |
+ | |
***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass it in minutes. I can either remove it by force, or ask the previous owner. Which one sounds easier to you, even if the previous owner can help you? BIOS passwords are intended to deter minimum wage employees.*** | |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock.***[br] | |
- | ***BIOS passwords are |
+ | ***BIOS passwords are like the TSA; they give the illusion of security, but anyone who knows what they're doing can bypass it in minutes. I can either remove it by force, or ask the previous owner. Which one sounds easier to you, even if the previous owner can help you? BIOS passwords are intended to deter minimum wage employees.*** |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done![br] |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled next time you go hit up the surplus auctions, you're done![br] |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock.***[br] | |
***BIOS passwords are as effective as the TSA. They give the illusion of security. It's game over once a seasoned cracker or professional gets to it, we're not going to ask the previous owners of the laptops even if we have it; I can go back and forth or just say screw it and get in. The BIOS password is intended to deter minimum wage employees.*** | |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done![br] | |
***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock.***[br] | |
- | ***BIOS passwords are as effective as the TSA. They give the illusion of security. It's game over once a seasoned cracker or professional gets to it, we're not going to ask the previous owners of the laptops even if we have it; I can go back and forth or just say screw it and get in.*** |
+ | ***BIOS passwords are as effective as the TSA. They give the illusion of security. It's game over once a seasoned cracker or professional gets to it, we're not going to ask the previous owners of the laptops even if we have it; I can go back and forth or just say screw it and get in. The BIOS password is intended to deter minimum wage employees.*** |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock. BIOS passwords are TSA grade security theater, they give the illusion of security; it's game over once a seasoned cracker gets to it.*** |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock.***[br] |
+ | ***BIOS passwords are as effective as the TSA. They give the illusion of security. It's game over once a seasoned cracker or professional gets to it, we're not going to ask the previous owners of the laptops even if we have it; I can go back and forth or just say screw it and get in.*** |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done![br] | |
- | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, GENERATE THE CODE AND BREAK IN, SAVE CHANGE AND MOVE ON; I'm not going to waste time and energy returning a BIOS locked Dell where the BIOS password is secured with the equivalent of a virtual Master Lock. BIOS passwords are TSA grade security theater, they give the illusion of security; it's game over once a seasoned cracker gets to it.*** |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these but I'm doing it for you because of the age of the laptop being old enough the odds of one being stolen is extremely low and they're decommissioned with a residual password. If it was newer, I'd be hesitant. Dell BIOS passwords are mostly security theater (like the TSA) and can be broken by anyone who can do 1+1=no more BIOS password. It's meant to scare the office user at best. |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done![br] |
+ | ***PLEASE READ ME: If you see this and are asking about a newer computer, normally I am apprehensive to touch these. For the M4400 I'm answering it because anything from the Core 2 era is thoroughly decommissioned, as well as Haswell-1st gen Core i (match the era for AMD). The odds someone stole a Core 2 era laptop are near zero to that much of a degree I'm not worried. If this was newer (and I won't mention what I consider "too new"), I'd have not answered this. I HAVE CRAKCED THESE WHEN I GOT THEM SECONDHAND BECAUSE OF BIOS PASSWORDS WITHOUT A CARE; GO IN, BREAK INTO THE BIOS, SAVE CHANGE AND MOVE ON. BIOS passwords are TSA grade security theater, they give the illusion of security; it's game over once a seasoned cracker gets to it.*** |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these but I'm doing it for you because of the age of the laptop being old enough the odds of one being stolen is extremely low and they're decommissioned with a residual password. If it was newer, I'd be hesitant. Dell BIOS passwords are mostly security theater (like the TSA) and can be broken |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these but I'm doing it for you because of the age of the laptop being old enough the odds of one being stolen is extremely low and they're decommissioned with a residual password. If it was newer, I'd be hesitant. Dell BIOS passwords are mostly security theater (like the TSA) and can be broken by anyone who can do 1+1=no more BIOS password. It's meant to scare the office user at best. |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these but I'm doing it for you because of the age of the laptop being old enough the odds of one being stolen is extremely low and they're decommissioned with a residual password. If it was newer I'd be hesitant. Dell BIOS passwords are mostly security theater (like the TSA). |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these but I'm doing it for you because of the age of the laptop being old enough the odds of one being stolen is extremely low and they're decommissioned with a residual password. If it was newer, I'd be hesitant. Dell BIOS passwords are mostly security theater (like the TSA) and can be broken in minutes. It's meant to scare the office user at best. |
I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
- | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled, you're good. You just can't turn it off on these because it's Persistence 1.0, not the newer 2.0 module. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these but I'm doing it for you because of the age of the laptop being old enough the odds of one being stolen is extremely low and they're decommissioned with a residual password. If it was newer I'd be hesitant. Dell BIOS passwords are mostly security theater (like the TSA). They're a troll for the inexperienced. |
- | I'm not going to provide links, but there's a site which can generate it. You need to press |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F2 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because of the age of the laptops being obvious decoms. It's not like this isn't new. Dell BIOS passwords are mostly security theater (like the TSA). They're a troll for the inexperienced. |
I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. | |
***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. They're like a troll under a bridge if you know what you're doing. | |
- | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. |
+ | |
+ | ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. They're like a troll under a bridge if you know what you're doing. | |
- | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE!*** |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE AND rpcnet.exe IS GONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. They're like a troll under a bridge if you know what you're doing. | |
- | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0.*** |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0. DO NOT USE IT UNTIL THIS IS DONE!*** |
Status:
open
Bewerkt door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. They're like a troll under a bridge if you know what you're doing. | |
- | I'm not going to provide links, but there's a site which can generate it. You press Shift+Enter on these, |
+ | I'm not going to provide links, but there's a site which can generate it. You need to press F12 or F12 (select BIOS setup if you use the OTBM), generate it and then press Shift+Enter on these. Once that's done, go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0.*** |
Status:
open
Bewerkt door: Nick
Tekst:
- | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. |
---|---|
+ | Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. They're like a troll under a bridge if you know what you're doing. |
I'm not going to provide links, but there's a site which can generate it. You press Shift+Enter on these, and then go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0.*** |
Status:
open
Origineel bericht door: Nick
Tekst:
Dell laptops use a master password, but BEWARE: Some models from the Haswell series had a master lockout added later, and it's baked into new ones from Broadwell to today. IF it's enabled, you're done! Normally I am apprehensive to touch these, but I'm doing it for you because it's old enough I trust they're decoms and this is known anyway. BIOS passwords on Dell are mostly security theater like the TSA. I'm not going to provide links, but there's a site which can generate it. You press Shift+Enter on these, and then go under security and then make sure Admin says "Not set", as well as the others. ***ALSO, BEWARE OF COMPUTRACE! Contact Absolute SW, give them the ST of the laptops, and have that crap disabled server side. You'll need drives and a new copy of Windows, but once it's disabled you're good. You just can't turn it off on these because it's Persistence 1.0, not 2.0.***
Status:
open