The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    "M17x-R3" has a serious security hole

    Discussion in 'Dell' started by Loris-1, May 23, 2012.

  1. Loris-1

    Loris-1 Newbie

    Reputations:
    0
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    5
    1) Because the computer allienware "M17x-R3" has a serious security hole,
    other computers do not have, I ask you to add a routine in the BIOS,
    so do ask for your password before you boot the system. In this way the boot
    from USB or cdrom is not allowed without the password.
    2) Come on you can disable "computtrace", although it has been activated by accident,
    as happened to me.
    3) Give the option to disable the BIOS to boot from cdrom, harddrive and stick.
    Opure write another Bios With the suggested changes, and if not enough memory,
    delete also the image of 'alien to boot, so that a user can choose
    the most suitable for him.

    After these changes are essential in the BIOS, the computer is truly exceptional.
    Without these changes I will recommend it to anyone.

    Describe the problem below:

    Excuse my English.
    I bought about a month "Alienware m17x-r3", and has a gap in security.
    The Dell support would change my motherboard, but when the technician came, I
    refused, I wanted him to see the problem. The problem is not hardware but
    the programming that the bios.

    The Hardwar would be a failure, only if after setting the password, do not ask,
    even to enter the bios, but instead asks. If I enter the bios with that of "superuser" I
    allows you to change all the options, but if I put the "user" I can
    change only a few.

    Ivece to show off a lot of choreography with the initial boot image, which occupies
    much memory, they could create a more configurable bios, adding
    password to boot the system by including the block below password
    the hard disk, turning off the boot, internal or external devices, for
    as DVD, USB stick, short iserendo more configurable options,
    in order to make the BIOS more versatile. They could also insert a test
    fast memory.

    To violate the security of this system is very easy, just boot from a cd
    LINUX-LIVE, any distribution, the harddisk install the windows and wallow in it.

    Hopefully they update the BIOS in the future, to close this gap in security.

    I tried it on a Dell desktop PC, and I entered the harddisk with windows
    ease.
    Hello.
     
  2. Loris-1

    Loris-1 Newbie

    Reputations:
    0
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    5
    How can I contact the developers of the bios?
     
  3. DR650SE

    DR650SE The Whiskey Barracuda

    Reputations:
    7,383
    Messages:
    8,222
    Likes Received:
    182
    Trophy Points:
    231
    Quit spamming the forum you posted this in the M17x subsection.
     
  4. katalin_2003

    katalin_2003 NBR Spectre Super Moderator

    Reputations:
    14,963
    Messages:
    5,671
    Likes Received:
    1,521
    Trophy Points:
    331
  5. Ferrari353

    Ferrari353 Notebook Evangelist

    Reputations:
    165
    Messages:
    508
    Likes Received:
    1
    Trophy Points:
    31
    What are you even saying? Where's the "security hole"?