When the CMOS password is lost, you can try to change the hardware configuration of the machine before restarting. Because at startup, if the system finds that the new hardware configuration is different from the original hardware configuration, it may allow direct access to CMOS reset without password. The way to change the hardware configuration is simple, such as unplugging the memory stick or installing different types of CPU (of course, the motherboard supports it), replacing a hard disk and so on.
Method 2: Universal encryption
At present, most BIOS systems for mainboards are basically from manufacturers such as Award and AMI. These manufacturers reserved a common password for their BIOS at the time of production, just in case.
General passwords before AWARD 4.5 1 are Wantgirl, Syxz, dirrid, AWARD, Ebbb, 589589, h996, AWARD_SW, j262, HLT, SERSKY_FOX, BIOSTAR, ALFAROME, jkwpeter, j256, Award? SW, LKWPETER, aLLy, 58972 1, clumsy, in series.
The universal PASSWORD of AMI BIOS is AMI, BIOS, password, HEWITT RAND, AMI? SW, AMI_SW, LKWPETER, A.M.I Attention.
It should be case-sensitive.
The above master password is almost accurate for cracking CMOS passwords on 486 and Pentium motherboards, but not so good for PII and above motherboards. Few master passwords can crack new motherboards above PII level. As far as we know, we can try using abaubjao.
Method 3: Use Debug command to crack the set password.
If the computer can be turned on normally, but it can't enter the BIOS settings, it means that the machine has a password. This password setting is mainly to prevent unauthorized users from setting BIOS, but you can use Debug command to send a data to ports 70H and 7 1H in DOS state to clear the password manually. The specific operation is as follows:
c:\ & gt; shakedown test/debug
—0 70 10
A O 7 1 0 1
Yi q
or
c:\ & gt; shakedown test/debug
—0 70 2e
—O 7 1 00
12/970
—O 7 1 00
Yi q
After restarting the computer, you can directly enter CMOS to modify the settings without asking for a password.
pay attention to
70 and 7 1 are two ports of CMOS. You can write some wrong data (such as 20, 16, 17, etc.). ) Give it to them at will, which will destroy all the settings in CMOS.
Method 4: Invincible copy method
When the system is ready to start Windows after self-checking, press (P8) key, select "Command Prompt in Safe Mode Only", and in DOS state (or in DOS of Windows95), type the following command:
C: >; Copy cmos.com
Then enter the editing state, hold down the [Alt] key with one hand, tap the following number string on the keypad with the other hand (pressing the number keys on the keypad has no effect), then raise your hand at the same time, and so on:179,55,136,216,230,65433. 1 13,254, 195, 128,25 1,64, 1 17,24 1, 195。 In the process of input, every time you release the [Alt] key, a random character will appear on the screen, so don't worry. When finished, press [Ctrl+Z] or [F6] to save and get a new program Cmos.com.
Run the file yk. Open com directly, there should be no prompt information on the screen, and then restart the computer to clear the password in CMOS. Of course, other settings in CMOS will also be cleared at the same time, which requires a reset.
You can use "typecorm". Com "command to display the contents of the file, and the displayed contents should be ASCII code.
Restart, press the (Del) key to enter directly, which can reset CMOS. In the future, you can unlock the COMS password by running the Cmos.com program.
Method 5: Use the tool software Cmospwd.exe.
You can use Cmospwd, a tool software dedicated to cracking CMOS passwords. As long as the program is started under DOS, the user's CMOS password will be displayed. The tool software supports BIOS such as Acer, AMI, AWARD, Compaq, Dell, IBM, PackageBell, PHOENIX, ZENITH AMI, etc. It is very convenient to use.
Method 6: COMS password cracking tool CMOSCracker
Today's PC can set the power-on password. Password-There are generally two kinds: user password and administrator password. The former can be turned on and the latter can be set in CMOS. These two passwords are stored in the BIOSRAM chip of the motherboard, but they are not simply stored. Instead, they are encoded to form the ciphertext of 32-bit words. When the computer is turned on, the user enters a password, which is encoded in the same way and then compared with the stored ciphertext. If they are the same, the password is correct, otherwise the password is wrong. Because passwords can accept printable ASCII characters with a minimum length of 1 and a maximum length of 8, the minimum ASCII code that can be used as password characters is 20H, that is, "space" characters, and the maximum ASCII code is 7EH, that is, * * includes 7eh-20h+ 1 = 95 characters. Obviously, the password combination * * * consists of 95 first-level passwords +95 second-level passwords +95 third-level passwords +… +95 eighth-level passwords = 95x (( 1-95 eighth-level passwords) /( 1-95)) > 95 eighth-level encryption, that is, more than 660 billion.
CMOSCracker tool uses this principle to take out the secret words stored in BIOSRAM chip, and then perform inverse operation to find some password strings. Although it is not necessarily the same as the original password, it must be the same as the encrypted word of the original password after encoding, so as to achieve the same effect as the original password.
Method 7: Tool software BiosPwds.exe
With this tool, you can easily know the password of BIOS. It's quite simple to use. After implementation, there will be an interface of BiosPwds. Just click the [Get Password] button on the interface to display various BIOS information on the interface of BiosPwds, including BIOS version, BIOS date, usage password, common passwords, etc. At this time you can easily know the BIOS password.
Method 8: CMOS discharge
If you can't start the computer without a password, that is, the machine has set a system password, then you can't solve the problem of forgetting the password through software. At this time, the only way is to open the chassis, discharge the CMOS, clear all the contents in the CMOS, and then restart the computer for setting.
The discharge modes include battery short circuit, jumper short circuit and chip discharge.
Battery short-circuit method is to remove the battery from the motherboard, short-circuit the battery socket with wires, discharge the capacitor in the circuit, and clear the information in CMOS RAM chip; Some motherboards are equipped with CMOS password clearing jumpers. Refer to the motherboard manual to short the jumper, which is the so-called jumper short circuit method. Chip discharge method is to quickly and evenly scan a wire with one end grounded on the pin of CMOS chip.