686 Amibios 1999 Bios Update

    Removing a Bios - CMOS Password

Unfortunately, access to computers can, at times, be blocked for all of the wrong reasons. Sometimes this occurs due hardware related issues such as electrical problems or due to inadvertence, such as someone setting and then forgetting the password. It can happen as the result of accidental use of a Bios password by a new user. This also often occurs when an employee who is quitting or has been terminated, sets the Bios password as some form of retaliation against an employer. Reversing this can be time consuming as well as very frustrating depending upon the motherboard manufacturer and the make and model of the motherboard. Relax though, as it is possible to reset or disable the password.

Electrical or static related issues:

At times, and without any obvious reason, static discharges as well as other electrical problems can cause the PROM on the motherboard to reset the Bios (CMOS) to its default values and even cause the default Bios password to be set. These are some of the default Bios passwords used with different Bios's, give them a try first.

  • AMI
  • Award
  • bios
  • setup
  • cmos
  • concat
  • AMI_SW (case sensitive)
  • AMI!SW/
  • AMI?SW/
  • j262
NOTE: With respect to the Award BIOS, the 'AWARD_SW' (use without quotes) and (is is case sensitive) password should even override a set password! If not, you may also want try j262 as the password.

Removing Arbitrary or Revenge Passwords:

Top amibios 686 ethernet Download periodically updates drivers information of amibios ethernet driver update full drivers versions from the publishers, but some information may be slightly out-of-date. Olympus II – Driver. Windows platforms generally apply a generic driver that allows amibios 686 ethernet to recognize the Ethernet component. . AMIBIOS PENTIUM CPU PCI ISA BIOS Small Logo. AMIBIOS 686 Small Logo. AWARD BIOS PCI/PNP 686. AWARD BIOS PCI/PNP 686 Small Logo. AWARD Micro BIOS PCI/PNP 686 Small Logo. AMIBIOS Micro BIOS PCI/PNP 686 Small Logo. PhoenixBios D686 BIOS Small Logo. AMIBIOS waits for.5 seconds after sending a RESET signal to the IDE drive to allow the IDE drive time to get ready again. AMIBIOS checks for a key press and runs WINBIOS Setup if the key has been pressed. Enabled: AMIBIOS does not test system memory above 1 MB.

Many times we have had customers contact us explaining that either an employee or family member has set a Bios password and then forgot what it was, making access to the computer impossible. A few times we have seen vindictive employees set Bios passwords as their way of getting even with their employer. Most times though, this is a well-meaning effort on the part of an employee to secure employer data, so don't punish the employee if this is the case. As far as family members are concerned, we have heard just about every explanation possible ranging from adults trying to regulate computer use by their children or one adult trying to curb computer use by his or her significant other. We have even had some reasons that we simply can't publish here. In any event, reversing the setting of this password is not impossible, it just takes some thought and some work.

If you have tried the passwords listed above and none have worked, then there are a few more options to try. You can attempt to erase the Bios/CMOS settings and have the Bios return to its default settings or you can use use a Bios/CMOS password utility (password crack) to try and erase or reset the password.

Forcing the Bios-CMOS to be Reset to Default Values:

There are two ways to approach forcing the Bios/CMOS to be reset to its default values: Option #1: Mechanically, by removing all power to the Bios/CMOS thereby forcing it to reset itself to its stored defaults, which include no password or the default password employed by the Bios manufacturer, and Option #2: Using a program to either locate and identify the password and reveal it to you or erasing the password entirely. These are referred to as password by-pass utilities or cracks. Let's look at Option #1 first, and then move on to Option #2 if necessary.

Option #1: Mechanically Removing the Password

Most motherboards manufactured over the last decade or more use a battery to sustain the dynamic Bios/CMOS settings for the motherboards PROM chip. These dynamic settings are those manually set by either the computers manufacturer or you, the user. There are two ways to erase these dynamic settings, by either resetting a jumper on the motherboard itself (referred to as a 'clear CMOS' jumper), or by physically remove the power from the computer (disconnecting the power plug) and then removing a battery (used to maintain power to the PROM chip that contains the Bios/CMOS information) from the motherboard.

686 amibios 1999 motherboard

Motherboard Jumpers:

Some, but not all, motherboard manufacturers provide a set of three jumpers on their motherboards that provide you with the ability to clear the Bios/CMOS settings, thereby allowing them to be reset. For the most part this is used when the Bios/CMOS data becomes scrambled and you need to clear the Bios/CMOS in order to return the computer to a functional state. This same procedure, however, can be used to clear passwords from the Bios/CMOS setup. Typically a jumper will be found across pins #1 and #2 as the default position, and by shutting the computer down, unplugging the power cord and then moving the jumper so that it is across pins #2 and #3 will clear the Bios/CMOS settings.

Here's an example of a Supermicro PIIISEA motherboard.

As you can see from the picture, we have added two small red arrows. The arrow to the left denotes the location of the 'Clear CMOS' jumpers, while the red arrow to the right denotes the location of the CMOS battery.

Here are the procedures if the jumpers are present on the motherboard:

  • Locate, if possible, the instruction booklet for your motherboard. If you cannot locate the booklet, then user the motherboard references on this site to locate the manufacturer and see if a manual is available there. You may also want to closely examine the motherboard itself.

  • Shut down your computer and disconnect the power plug.

  • Now identify where the jumpers are located, then check the present pin location and the location of the jumper on those pins to determine their default location. As an example, the default location on the above motherboard is to have the jumper across pins #1 and #2. Write it down!

  • Next, move the jumpers from the their default location (Example: from across pins #1 and #2 as above) and then place the jumper across pins #2 and #3.

  • Leave the jumper in place for 20 to 30 seconds and then return it to its default location.

  • Now plug the power cord back in and restart the computer.

  • When the computer begins it's startup (boot) process, tap the DEL, F10 or F1 key, (whichever is appropriate for your computer) to get into the Bios/CMOS setup. If you need more detailed information as to how to get to the Bios/CMOS setup, follow this link. Bios Basics

  • Once into the Bios/CMOS setup, look for a section or area to set the Bios/CMOS to its default settings. This will return the motherboard to either its basic or optimum settings depending upon the motherboard manufacturers settings. You will then need to verify certain settings, such a CPU and memory as well as hard drive type and size recognition. If you need more information regarding these settings, follow either of these links: For an AMI Bios or for an Award Bios.

  • After making any final adjustments, save your settings and restart the computer. The Bios password should be gone and the Bios set to its optimum settings.

If the 'Clear CMOS' jumpers are not present or not available:

The procedures for clearing a Bios/CMOS without jumpers is essentially the same as those given above when they are present, it just takes a little more effort.

  • Shut down the computer and disconnect the power plug.

  • Locate, if possible, the instruction booklet for your motherboard. If you cannot locate the booklet, then user the motherboard references on this site to locate the manufacturer and see if a manual is available there. You may also want to closely examine the motherboard itself.

  • Now identify where the battery is located on the motherboard. It will be approximately 1/2 inch in diameter.

  • Normally these batteries are held into place with one or more small clips over the face of the battery. Carefully lift the battery out of its socket and set it aside. Note: Some batteries are actually soldered to the motherboard, so take that into consideration and be careful.

  • Leave the battery our of the computer for about 20 to 30 minutes and then return it to its socket.

  • Now plug the power cord back in and restart the computer.

  • When the computer begins it's startup (boot) process, tap the DEL, F10 or F1 key, (whichever is appropriate for your computer) to get into the Bios/CMOS setup. If you need more detailed information as to how to get to the Bios/CMOS setup, follow this link. Bios Basics

  • Once into the Bios/CMOS setup, look for a section or area to set the Bios/CMOS to its default settings. This will return the motherboard to either its basic or optimum settings depending upon the motherboard manufacturers settings. You will then need to verify certain settings, such a CPU and memory as well as hard drive type and size recognition. If you need more information regarding these settings, follow either of these links: For an AMI Bios or for an Award Bios.

  • After making any final adjustments, save your settings and restart the computer. The Bios password should be gone and the Bios set to its optimum settings.

Option 2: What to do if changing jumpers or removing batteries doesn't work:

On some motherboards there are no jumpers to be moved and the battery may be soldered into place and cannot be removed. There may also be those occasions where moving jumpers or removing batteries just won't work. This is often the case on early motherboards.

In these instances, there are three additional options to be considered.

Option #1:

You can physically remove the Bios/CMOS PROM chip from the motherboard and send it either to the motherboard manufacturer or a Bios developer for replacement of flashing. You can also send the entire motherboard to a facility experienced in these operations.

Option #2:

If the motherboard has a flash updateable Bios/CMOS PROM chip, then you can download a fresh Bios update and re-flash the PROM to eliminate the password.

686686

Option #3:

As mentioned earlier, there are programs (utilities) and (cracks) that can be used to try and either identify the password or remove it forcibly from the PROM chip. Utilities to recover passwords are extremely expensive and are usually only sold to manufacturers and others involved in hardware and software development.

686

686 Amibios 1999 Bios Updates

Smaller utilities and those referred to as Bios crack programs are readily available. These, however, are used at your own risk. Please read and understand our disclaimer before downloading any of these types of utilities. By downloading any of these utilities you are agreeing to the terms of our disclaimers.

AMI Password Viewer with Source CodeAward Flash Utility in zip format
AMI 1 Zip (Early Password Viewer - 1994 version)Award Zip - Early password viewer
AMI 2 Zip (Password Viewer - 1995 and later)Award1 Zip - Later password viewer
Remove Password ToolAward 2 Zip - Latest password viewer

Notice: Any or all of the above files should only be used by those professionals completely familiar with motherboard and Bios/CMOS issues and recovery. We make no warranty of any type as to any of these files, including their usability for a particular purpose. Using these files is at your own risk!

686 Amibios 1999 Motherboard Bios Update

Copyright ©2000 DEW Associates Corporation. All rights reserved.
Your privacy will be respected at all times.
Year 2000 Readiness Disclosure.

686 Amibios 1999 Motherboard

Galleria
Bios
Controller
Network Card
Riser Card
CPU Adapter
DC Fan
Memory
Floppy Disk Drive
iomega ZIP
Voltage Regulator
Misc
COMPONENTS: 236
AMIBIOS 386DX ISA BIOS
AMIBIOS 386DX ISA BIOS, no CPU PnP
386DX ISA BIOS
1992
AMIBIOS 486DX ISA BIOS
AMIBIOS 486DX ISA BIOS, no CPU PnP
486DX ISA BIOS
1993
AWARD BIOS ISA 486
AWARD BIOS ISA 486, no CPU PnP
BIOS ISA 486
1994
AWARD BIOS PCI/PNP 586
AWARD BIOS PCI/PNP 586, no CPU PnP
PCI/PNP 586
1995
AMIBIOS PENTIUM CPU PCI ISA BIOS Small Logo
AMIBIOS PENTIUM CPU PCI ISA BIOS, no CPU PnP
PENTIUM CPU PCI ISA BIOS Small Logo
1993
N/D
AMIBIOS 686 Small Logo
AMIBIOS 686 Small Logo, no CPU PnP
686 Small Logo
1995
AWARD BIOS PCI/PNP 686
AWARD BIOS PCI/PNP 686, CPU PnP
PCI/PNP 686
1998
AWARD BIOS PCI/PNP 686 Small Logo
AWARD BIOS PCI/PNP 686 Small Logo, CPU PnP
PCI/PNP 686 Small Logo
1998
AWARD Micro BIOS PCI/PNP 686 Small Logo
AWARD Micro BIOS PCI/PNP 686 Small Logo, CPU PnP
Micro BIOS PCI/PNP 686 Small Logo
1998
AMIBIOS Micro BIOS PCI/PNP 686 Small Logo
AMIBIOS Micro BIOS PCI/PNP 686 Small Logo, CPU PnP
Micro BIOS PCI/PNP 686 Small Logo
1999
N/D
PhoenixBios D686 BIOS Small Logo
Phoenix BIOS PCI/PNP 686 Small Logo, CPU PnP
PCI/PNP 686 Small Logo
1998
Link correlati
• AWARD
• PHOENIX
• PHOENIX - AWARD
• AMI
• OTHER

Link correlati
BIOS TYPE
• AWARD
• PHOENIX
• PHOENIX - AWARD
• AMI
• OTHER
Link veloci Bios
• AMIBIOS 386DX ISA BIOS
• AMIBIOS 486DX ISA BIOS
• AWARD BIOS ISA 486
• AWARD BIOS PCI/PNP 586
• AMIBIOS PENTIUM CPU PCI ISA BIOS Small Logo
• AMIBIOS 686 Small Logo
• AWARD BIOS PCI/PNP 686
• AWARD BIOS PCI/PNP 686 Small Logo
• AWARD Micro BIOS PCI/PNP 686 Small Logo
• AMIBIOS Micro BIOS PCI/PNP 686 Small Logo
• PhoenixBios D686 BIOS Small Logo
CPU
• Intel Celeron Northwood-128 2.4GHz SL6VU #03
• Intel Pentium 4 630 Prescott 3GHz SL7Z9 #03
• Intel Pentium 4 540J Prescott 3.2GHz SL7PW #02
• Intel Pentium 4 Prescott 2.93GHz SL7YV #02
• Intel Pentium 4 Prescott 3GHz SL7PM #04
• AMD Sempron 64 3200+ Manila SDA3200IAA2CW
• AMD Sempron 64 2600+ Palermo SDA2600AIO2BA #02
• AMD Sempron 64 3200+ Manila SDA3200IAA2CN
• AMD Sempron 64 2600+ Palermo SDA2600AIO2BA
• AMD Athlon 64 X2 3800+ Windsor ADO3800IAA5CU
• AMD Athlon 64 3000+ Winchester ADA3000DIK4BI
• AMD Athlon 64 3800+ Venice ADA3800DAA4BW
• AMD Athlon 64 3500+ Venice ADA3500DAA4BP
• AMD Athlon 64 3500+ NewCastle ADA3500DEP4AW
• AMD Athlon 64 3200+ Venice ADA3200DAA4BW #03
• AMD Athlon 64 3000+ Venice ADA3000DAA4BW
EXPANSION CARD
• ZyXEL FN312 (37NB-122000+212) PCI
• nVIDIA RIVA TNT2 M64 SP5200B REV:T9B AGP #02
• GIGABYTE GV-GF1280-32E (GeForce2 MX200) AGP #02
BIOS STRING
• 09/14/2006-MCP61M-AM-6A61KE11C-00 (ELITEGROUP HT2000 (MCP61PM-AM) REV:1.0)
• 63-1104-000010-00101111-071706-RC410-A0313001-Y2KC (ASUS P5RD1-VM)
BIOS TYPE
• PHOENIX-AWARD WorkstationBIOS 6.00PG ACER
Statistiche gruppi
9 [FPU / Microcontroller] • 11 [Bios] • 19 [Graphic Card] • 7 [Controller] • 8 [Sound Card] • 4 [Network Card] • 7 [Daughter Card] • 14 [Riser Card] • 4 [Misc Card] • 3 [CPU Adapter] • 34 [CPU Fan/Heatsink] • 2 [DC Fan] • 3 [Modem] • 6 [Memory] • 9 [Battery] • 3 [Floppy Disk Drive] • 11 [Hard Disk] • 5 [iomega ZIP] • 11 [OS] • 2 [Voltage Regulator] • 15 [Floppy Disk] • 49 [Misc]