Hi all,
I'm currently using BIOs version 502 on my w3v, and i've been using its BIOs boot-up password to prevent unauthorised user from entering BIOs settings, and Windows. I've been using this method for my desktop computer and the first time i've received this laptop.
But the serious flaw i've discovered on W3V BIOs v502 was that whenever the password prompt at boot-up, all you have to do is enter 2 times, and you have by pass its password prompt without entering any password!
I'm obviously familiar how to enable security boot-up feature through BIOs, thus theres certainly some flaw in its BIOs, or is it just me? Can somebody with W3v w/ BIOs v502 verify with me that this BIO security boot-up can be bypassed without even entering the password, but just hitting enter 2 times?
-
UPDATE:
I've updated BIOs version from 502 to 602, it was released recently for W3v. It did't seem to have any affect on this BIOs bootup flaw.
Just want to make YOU to make sure/aware this password i had set in BIOs is for user access(full), and the password is for both access to BIOs settings or Windows, it will be prompted for password whenever you restart your computer while your computer is in boot-up.
Please verify that even with the latest BIOs the boot-up security flaw is still there. [There is no password set for harddisk security feature. security feature had only been set for bootup purpose which is flawed by just pressing 2 times enter to skip the password prompt before entering the gates of BIOs setting or Windows
W3v BIOs security password flaw?
Discussion in 'Asus' started by JingYou, Sep 19, 2005.