stsspecial
stsspecial
Untitled
4 posts
Don't wanna be here? Send us removal request.
stsspecial · 4 years ago
Photo
Tumblr media
BIOS and boot passwords can protect you from hackers - enterprise password management
Of course, the opposite of a password that keeps you out of your system is a password that keeps others out of your system. The BIOS in some PCs may provide no password protection at all, a single password that controls access to BIOS setup and allows the system to boot up, or two passwords—one for access to BIOS setup (a Setup or Supervisor password) and bootup, and the other to control access to booting up only (a User or Boot password). To set a password for your system, look in the setup menus for security settings, as shown in image.
A User or Boot password keeps the system from booting up—a measure of intrusion and system hacking protection. A Systemor Supervisor password keeps lurkers out of your BIOS settings, and keeps them from changing the User/Boot enterprise password management.
If you are going to set a best User or Boot password, be sure you also set a Setup or Supervisor password so the BIOS settings and boot password cannot be changed and so someone cannot set a Supervisor password to keep you out of the system, requiring you to bypass the BIOS password. Because there is a back door, the only way to prevent attackers from circumventing the password is to use a case that can be locked shut with a key or a locking cable.
READ MORE
0 notes
stsspecial · 4 years ago
Photo
Tumblr media
Bypass the BIOS Password
Recover from a CMOS memory-affecting virus or work around a boot-time password by making BIOS forget all it once knew.
A PC goes through a process when it is first turned on: the Power-On Self-Test, or P.O.S.T. Some system boards provide security measures that demand a password before beginning the P.O.S.T. process or allowing you into the BIOS setup program.
The original IBM-PC (1981) did not provide any security measures or a BIOS setup program; all it had was a P.O.S.T. If you needed to configure a PC, you did it with switches and jumpers. A program to set up the system BIOS and configuration did not come along until the IBM-PC/AT (1984), and it had to be run from a special boot-up diskette. The idea of providing a user interface and access to the system configuration settings within the BIOS did not come along until about 1986. Today no PC system is made without this valuable built-in setup feature. Eventually, the security feature of password-protecting access to the system came along.
If, after turning on your PC, you are prompted for a password instead of greeted with a fancy logo screen or the technical gibberish that suggests the system is getting ready to let you use it, then a security feature has been turned on that we call a “pre-boot password.” Without the right password to get past this point, the system is basically dead in the water—game over, do not pass go and collect $200—unless or until you reset the BIOS setting. But how do you do that without getting past the password to the setup program?
NOTE
This hack is also very effective for putting the system board back into “factory stupid” mode where it knows nothing about your system components and forgets all of your parameter tweaks. This is very useful if you’ve performed a hack that renders the system unbootable or unstable.
The goal is to get the system to forget that it needs a password and forget what the password was. The password data is stored with the rest of the system configuration data in a small amount of memory that is kept alive using a small battery or internal power cell. To clear out the data, you need to remove the power from this memory element. This means the system will also lose any system configuration that was saved. You’ll need to later reconfigure the system parameters so you can boot your operating system.
READ MORE 
0 notes
stsspecial · 4 years ago
Text
Explain Detail Hacking your system | hacking
Hacking your system | BIOS | CPU | Peripherals Or Operating System
With the exception of your PC’s unhackable power supply, hacking your PC starts with the lowest level of detail within your system board—from how fast the clock is that makes the CPU tick to how the I/O bus is configured for your hard drives and peripherals. Hacking starts with the Basic Input/Output System (BIOS) setup program, which affects the CPU, memory, chipset, and peripherals.
While some PC users think in terms of exotic mice, expansive flat-panel LCD screens, and high download bandwidth speeds, there are myriad mysteriously-named parameters and features within the system BIOS. These parameters may control everything from CPU and memory clocking to I/O device configurations and system passwords. The right amount of parameter tweaking at the BIOS level can squeeze another few million-instructions-per-second (MIPS) or microseconds of faster video or hard drive performance out of the bones of your system.
Of course, like anything functional, the right bones or foundation elements have to be in place—in this case reliable and capable system components (CPU, chipset, and memory) and a BIOS, the essential innards of any PC, that can be tweaked. Tweaking or hacking a system board is done with software settings in the BIOS setup program, hardware jumpers, or dual-in-line-package (DIP) switches, so you must have the manual for your system board handy to be able to locate the correct jumpers and switches. I recommend you also have a small flashlight handy so you can see, as well as a pair of needle-nosed pliers to move jumpers around, and the right screwdriver to be able to get into your PC’s case. Other than these tools, all you need is a steady hand and attention paid to the keystrokes needed to navigate your PC’s setup program.
Before you hack the system board, CPU, BIOS, peripherals, or operating system, there are a few basic things I need to cover to get you out of any trouble you can get yourself into with the hacks in this and subsequent chapters. Hacking your system BIOS has potential dangers: one slipup and things can quit working. Fortunately there are some easy ways out of most mistakes made at this level of system hacking.
Your PC’s system board typically comes to you “factory fresh” without any tweaks or parameters set to abnormal values. Once you start reconfiguring the system, almost anything can happen—from not being able to boot up at all, to partial boot and system crash, to partial boot and all else is pending a password you forgot or never knew. These hacks will get you around a couple of common mistakes and problems that will inevitably come up as you work with numerous PCs.
Stsspecial and login
0 notes
stsspecial · 5 years ago
Text
Good Mobile Phone Forensics | Mobile device forensics
Abstract More than often in our days, cases go to trial and crimes are solved with the help of evidence taken from the mobile phones and their use. Typical examples of such evidence are the mobile phone’s location (based on the serving base station and/or GPS data), the contacts correlation (based on incoming and outgoing calls), communication content (based on messages and emails send/received/stored), and so on. In this chapter, we will analyze the subject of digital evidence from mobile phones from both the theoretical and the technical side.
*Mobile phone forensics
-Mobile phone crime
-Mobile phone evidence
-IOCE
-ACPO
-Data preservation
-SIM card
-GSM 11.11
-Files in SIM
-JTAG
The mobile phone betrayed the criminals…,
73 mobile phones and SIM cards were found in their hideout…,
The fatal error with the stolen mobile phone…
Stsspecial
Tumblr media
4 notes · View notes