Anybody use Bios Security options?
Anybody use Bios Security options?
Hello all,
In light of my stolen T41, I was wondering if I should have locked the system up using the bios security features. I didn't. The Windows log on, both Admin and User, were protected, but nothing else. I'm sure that whoever stole the laptop will just reformat the disc and reload it... well, perhaps they'll just reload it with the HPA... how convenient! I'm still p******!!!
I've never felt I ever had to worry about using all the security features in the bios, and in fact, I thought it might even be more dangerous to do so. I would hate for something to get corrupted and lock me out! I've heard too many horror stories and although I do have lab capabilities to reprogram eeproms and such, I still don't like having to go that route.
Do many of you use the bios security options... or do you just not worry about it?
Thanks,
makai
In light of my stolen T41, I was wondering if I should have locked the system up using the bios security features. I didn't. The Windows log on, both Admin and User, were protected, but nothing else. I'm sure that whoever stole the laptop will just reformat the disc and reload it... well, perhaps they'll just reload it with the HPA... how convenient! I'm still p******!!!
I've never felt I ever had to worry about using all the security features in the bios, and in fact, I thought it might even be more dangerous to do so. I would hate for something to get corrupted and lock me out! I've heard too many horror stories and although I do have lab capabilities to reprogram eeproms and such, I still don't like having to go that route.
Do many of you use the bios security options... or do you just not worry about it?
Thanks,
makai
Hawaii born, living in California.
T41, T42, X31, X61S
T41, T42, X31, X61S
I consider the bios security options pretty important...Windows password are just too easy to crack. Not to promote nefarious acts, but drop in an Ophcrack LiveCD and see how long it takes to retrieve your password....you'll use bios passwords.
I agree that there can be some issues with setting them, but I think most of the problems arise when people set a supervisor password and then forget it. I wouldn't consider them the ultimate security measure, but they will probably deter the majority of people who try to break into a stolen laptop.
I'd like to think that the bios passwords, in addition to being decent security measures, would provide me a little satisfaction when the thief realizes he's not getting anywhere near my files.
I agree that there can be some issues with setting them, but I think most of the problems arise when people set a supervisor password and then forget it. I wouldn't consider them the ultimate security measure, but they will probably deter the majority of people who try to break into a stolen laptop.
I'd like to think that the bios passwords, in addition to being decent security measures, would provide me a little satisfaction when the thief realizes he's not getting anywhere near my files.
W510: i7-820QM / 8GB 1066 RAM/ 1 GB NVIDIA Quadro FX 880M / 500GB 7200rpm / 15.6" HD 1080 / Arch Linux
-
andyP
- **SENIOR** Member

- Posts: 821
- Joined: Tue Dec 27, 2005 10:56 am
- Location: Ratingen, Germany
- Contact:
My sympathies regarding your loss
I have always set BIOS supervisor, power on, hard drive master and user passwords.
Here's hoping I never suffer from amnesia
I have always set BIOS supervisor, power on, hard drive master and user passwords.
Here's hoping I never suffer from amnesia
T61p 6460-67G; 15,4 WSXGA+ W7P x64, no hairdryer.
T43p 2668-G2G, 14,1 SXGA+, XP Pro, internal hairdryer
T23 2647-9LG, 14,1 SXGA+, XP Pro, no hairdryer
T43p 2668-G2G, 14,1 SXGA+, XP Pro, internal hairdryer
T23 2647-9LG, 14,1 SXGA+, XP Pro, no hairdryer
The #1 reason to set the passwords is... so someone else can't. Every so often some poor [censored] will come on the board with a machine that "grew" a password while they were away from it. Funny joke to play on a co-worker, especially if it is set to a long random string of characters that the person doesn't bother to write down.
Always set the Supervisor Password at a minimum. Just make sure it is something you will never ever forget, then write it down and keep it someplace safe.
Ed Gibbs
Always set the Supervisor Password at a minimum. Just make sure it is something you will never ever forget, then write it down and keep it someplace safe.
Ed Gibbs
-
RealBlackStuff
- Admin
- Posts: 17485
- Joined: Mon Sep 18, 2006 5:17 am
- Location: Mt. Cobb, PA USA
- Contact:
And it would take someone in the know less than 30 minutes (3 minutes in some cases) to reveal your 'secret' password.
The only password I have not (yet) been able to solve, is the Hard Disk password.
The only password I have not (yet) been able to solve, is the Hard Disk password.
Lovely day for a Guinness! (The Real Black Stuff)
Check out The Boardroom for Parts, Mods and Other Services.
Check out The Boardroom for Parts, Mods and Other Services.
I don't have any passwords set on machines that I use at home, but for my work Thinkpad I have both the Supervisor and HDD passwords set because the information on there is sensitive. Not "Treadstone" sensitive, but sensitive enough that I am worried about it.
I know that both the Supervisor and HDD passwords can be broken. I have the security chip enabled (not quite sure what that does, but it can't be bad, right?) and am using a passphrase with numbers and letters.
The Supervisor password seems to be breakable with a little bit of time and money. The HDD password seems difficult and/or expensive to break-- I take some comfort in knowing that it would be a lot cheaper for someone to buy another drive rather than hack mine.
A new concern for me is that there have been reports that TSA officials at airports are requiring some passengers to turn on their laptops to inspect the data and in some instances, copying that data off the laptop. My client data is confidential and although there is no way I would surrender it, I would also rather not miss my flight (or be subjected to the rubber glove). The next time I fly with data, I will probably take a personal machine and put the data on an USB drive then use Truecrypt or something similar to store it in a hidden partition.
I know that both the Supervisor and HDD passwords can be broken. I have the security chip enabled (not quite sure what that does, but it can't be bad, right?) and am using a passphrase with numbers and letters.
The Supervisor password seems to be breakable with a little bit of time and money. The HDD password seems difficult and/or expensive to break-- I take some comfort in knowing that it would be a lot cheaper for someone to buy another drive rather than hack mine.
A new concern for me is that there have been reports that TSA officials at airports are requiring some passengers to turn on their laptops to inspect the data and in some instances, copying that data off the laptop. My client data is confidential and although there is no way I would surrender it, I would also rather not miss my flight (or be subjected to the rubber glove). The next time I fly with data, I will probably take a personal machine and put the data on an USB drive then use Truecrypt or something similar to store it in a hidden partition.
Current Thinkpads: 600E, 600X, 701C, A31 (Flexview), R51 (Flexview), R60, T42P (Flexview), TR50E, T60 (Flexview), X61s (Ultralight), Z61m (Ti) Non-Thinkpad: Toshiba 100ct
This was my exact sentiment after I realized it might be stolen. Unfortunately, I goofed!Superego wrote:I'd like to think that the bios passwords, in addition to being decent security measures, would provide me a little satisfaction when the thief realizes he's not getting anywhere near my files.
Yah, it's sad, but I'll get over it. I already purchased a replacement from one of the members here. This time I'm locking it up before I send it to Vegas... and doubling the insurance! It'll cost more, but then if it get's stolen again, two things will happen... 1) the thief isn't going to have a fun time getting into the laptop, and 2) I'll be able to buy a newer type laptop and fly there to deliver it... after I collect the insurance!andyP wrote:My sympathies regarding your loss
This, I will do!egibbs wrote:Always set the Supervisor Password at a minimum. Just make sure it is something you will never ever forget, then write it down and keep it someplace safe.
Hopefully, the thief isn't such a person.RealBlackStuff wrote:And it would take someone in the know less than 30 minutes (3 minutes in some cases) to reveal your 'secret' password.
I heard about this, and I thought you could refuse without repercussions. I hadn't paid much attention to the news, but I never knew they would copy data! Sheesh, what's this world coming to?virge wrote:A new concern for me is that there have been reports that TSA officials at airports are requiring some passengers to turn on their laptops to inspect the data and in some instances, copying that data off the laptop.
From now on, I'm locking everything up, just in case! Thanks guys for the responses!
makai
Hawaii born, living in California.
T41, T42, X31, X61S
T41, T42, X31, X61S
-
ajkula66
- SuperUserGeorge

- Posts: 15733
- Joined: Sun Feb 25, 2007 11:28 am
- Location: Brodheadsville, Pennsylvania
None of my computers contains any sensitive data.
None of my Windows-running machines have passwords.
Sensitive data is saved on paper in language that not too many people understand, and in my (aging) little gray cells...
Good luck.
None of my Windows-running machines have passwords.
Sensitive data is saved on paper in language that not too many people understand, and in my (aging) little gray cells...
Good luck.
...Knowledge is a deadly friend when no one sets the rules...(King Crimson)
Cheers,
George (your grouchy retired FlexView farmer)
AARP club members:A31p, T43pSF
Abused daily: R61
PMs requesting personal tech support will be ignored.
Cheers,
George (your grouchy retired FlexView farmer)
AARP club members:A31p, T43pSF
Abused daily: R61
PMs requesting personal tech support will be ignored.
Wish I could say that too George, but sadly in a world and age where most of our work (mostly irrespective of field) is done on/with computers it is hard for most people not to (even accidentally) have sensitive data on their computers. It is all in the game ...
Now: T60 2613-EKU | T23 2647-9NU | 600X 2645-9FU | HP 100LX
Past: X31 2673-Y13 | T41 2374-3HU | T22 2647-AEU
Rules of the road
Past: X31 2673-Y13 | T41 2374-3HU | T22 2647-AEU
Rules of the road
Yah... I would consider something as simple as a phone list to be confidential. Or even something like an autobiography or letters to family, photos of family, and even passwords to programs I own. They are all sensitive information to me. These things are on all my computers. Every computer is User password protected, but none were bios protected... not yet, but soon!
Hawaii born, living in California.
T41, T42, X31, X61S
T41, T42, X31, X61S
So far this has been limited to Customs official, not the regular TSA screeners. Though that is no doubt coming eventually. Customs has (on occasion) either imaged drives or taken laptops and made people fight to get them back - in one case a businesswoman had been trying for over a year to get back a machine that Customs had impounded.virge wrote:A new concern for me is that there have been reports that TSA officials at airports are requiring some passengers to turn on their laptops to inspect the data and in some instances, copying that data off the laptop. My client data is confidential and although there is no way I would surrender it, I would also rather not miss my flight (or be subjected to the rubber glove). The next time I fly with data, I will probably take a personal machine and put the data on an USB drive then use Truecrypt or something similar to store it in a hidden partition.
Before you go out and TrueCrypt everything, consider that will just make them more curious. They can't make you give up your passphrase, but they can explain that if you don't they will need to hold the machine and give you a phone number to call to try to get it back.
The scariest thing is that the Government makes no representations about what they will do with the data they suck off machines. We know that they will check it for kiddy porn because they have already busted a few people that way. But that is not by any means the ony thing they can and will do.
They could, for instance load it into a searchable database, the successor to the Total Information Awareness program. Then they could map linkages between people based on who has who in their contacts or who has emails from who.
Suppose you work for a company that has Government contracts, and are involved in putting together proposals and negotiations. How would you like it if the Government had all of your internal emails and rough drafts of the proposal because they found them in the database?
Or how about attorney/client communications relating to a suit against the Government - should the Government have those? They will.
Companies are just beginning to figure out how to deal with border searches of laptops. My company requires that any traveler going overseas must check out a clean machine from Computer Services and bring no files or data without specific approval. While overseas they must use Remote Desktop so that no data is actually brought to their machine, only images of their desktop in the US.
Ed Gibbs
-
brainpicker
- Senior Member

- Posts: 723
- Joined: Mon Mar 28, 2005 6:13 pm
- Location: Shady Hills, Florida (USA)
I now use all available passwords and security so that my "sensitive data" is somewhat protected. Wow, what a great day & age to be a teenager this 21st century is. Heck (...oops, I almost used that word again!
) in the 70's I could only hope Mom wouldn't find that, uh, "sensitive data" hidden under the bed or in a drawer!
I don't mean any disrespect to the OP for his loss. I've been there. It hurts and makes you feel kinda vulnerable.
- Yak
I don't mean any disrespect to the OP for his loss. I've been there. It hurts and makes you feel kinda vulnerable.
- Yak
brainpicker wrote:I now use all available passwords and security so that my "sensitive data" is somewhat protected. Wow, what a great day & age to be a teenager this 21st century is. Heck (...oops, I almost used that word again!![]()
) in the 70's I could only hope Mom wouldn't find that, uh, "sensitive data" hidden under the bed or in a drawer!
I don't mean any disrespect to the OP for his loss. I've been there. It hurts and makes you feel kinda vulnerable.
- Yak
Hawaii born, living in California.
T41, T42, X31, X61S
T41, T42, X31, X61S
The machine came up missing while in the care of USPS... it was never delivered. I was thinking of locking up everything, but now I don't know. For sure, anything I ship will be locked. There are no personal stuff on the laptops I ship, so it's just to make a thief a little more miserable.t20user wrote:I assume your machine was stolen in public?
I think from now on I will activate the passwords on machines I take on trips. But the one I keep at home is wide open, I wonder if I should lock that up too.
Hawaii born, living in California.
T41, T42, X31, X61S
T41, T42, X31, X61S
If that's the only comfort you can take from setting passwords, then it's certainly worth the price of admission.makai wrote:There are no personal stuff on the laptops I ship, so it's just to make a thief a little more miserable.
I set ALL the passwords.
For the average thief, the fact that they get the purloined goods home and are confronted with a PW prompt when attempting to turn it on is usually sufficient for them to feel "cheated". If they make a concerted effort and search the internet for ways to remove a power on PW, the fact that I always set BIOS PWs leaves me with the knowledge that short of their spending a great deal of time and money attempting to remove same they've effectively stolen a doorstop.
The HD PW gives me adequate insurance that I'll have sufficient time to change my banking and other important access information before others can access my accounts.
TSA gets to see a blinking PW prompt as assurance that it's indeed a working laptop, anything more will require a search warrant! Nor will one of Kip Hawley's morons ever get their hands on anything of mine outside of my view. Customs gets full access to my X31, the only machine that travels outside the country with me. The X31 is only used as a remote desktop a la' Ed Gibbs and as a storage device for whatever photos I might take on said trip.
In full disclosure I don't generally have to deal with TSA at all.
"Commercial airlines is for losers and terrorists." Homer Simpson.
James at thinkpads dot com
5.5K+ posts and all I've got to show for it are some feathers.... AND a Bird wearing a Crown
5.5K+ posts and all I've got to show for it are some feathers.... AND a Bird wearing a Crown
-
Robbyrobot
- Senior Member

- Posts: 573
- Joined: Tue Jun 26, 2007 7:46 am
- Location: Berlin, Germany
Nice theory, and it doubtless deters amateurs. In practice, as you surely know, the only thing that's really effective - and that only to protect your private data - is a hard drive password. And even then, replace the HDD and you have a saleable laptop.JHEM wrote:I set ALL the passwords.
For the average thief, the fact that they get the purloined goods home and are confronted with a PW prompt when attempting to turn it on is usually sufficient for them to feel "cheated". If they make a concerted effort and search the internet for ways to remove a power on PW, the fact that I always set BIOS PWs leaves me with the knowledge that short of their spending a great deal of time and money attempting to remove same they've effectively stolen a doorstop.
The fact of the matter is that no number of passwords can really deter theft - but paying attention to where you leave your laptop alone on a desk can.
-
wswartzendruber
- Junior Member

- Posts: 377
- Joined: Fri Apr 15, 2005 10:33 am
- Location: Idaho, USA
I'm pretty confident in my T60's BIOS password (fingerprinted).
Model: Lenovo ThinkPad T400
CPU: Intel Core 2 Duo P8400 (2.26 GHz, 1067 MHz FSB, 3 MB L2 Cache)
RAM: 4 GB PC-8500 (1067 MHz, Dual-channel)
HDD: 500 GB, 54000 RPM
Audio: Conexant CX20561 (192 kHz, 24-bit)
Video: Intel GMA 4500MHD
Wireless: Intel 5300
CPU: Intel Core 2 Duo P8400 (2.26 GHz, 1067 MHz FSB, 3 MB L2 Cache)
RAM: 4 GB PC-8500 (1067 MHz, Dual-channel)
HDD: 500 GB, 54000 RPM
Audio: Conexant CX20561 (192 kHz, 24-bit)
Video: Intel GMA 4500MHD
Wireless: Intel 5300
-
- Similar Topics
- Replies
- Views
- Last post
-
-
How can I tell if my T60 running BIOS 2.27 already has the Zender SLIC2.1 no-whitelist BIOS?
by Muse » Fri Apr 21, 2017 2:42 pm » in ThinkPad T6x Series - 4 Replies
- 772 Views
-
Last post by axur-delmeria
Sun Apr 23, 2017 11:47 am
-
-
-
safe to flash T500 7VET94WW bios with whitelist bios for 6FET92WW
by TPFanatic » Wed Apr 26, 2017 7:35 pm » in ThinkPad T400/410/420 and T500/510/520 Series - 4 Replies
- 726 Views
-
Last post by TPFanatic
Thu Apr 27, 2017 6:28 pm
-
-
-
Best display options (including mods) in 200s and 201s?
by wujstefan » Wed Jan 11, 2017 4:28 am » in ThinkPad X200/201/220 and X300/301 Series - 1 Replies
- 812 Views
-
Last post by RealBlackStuff
Wed Jan 11, 2017 8:52 am
-
-
-
T450s Replacement LCD Options
by Mathelo » Fri Jan 13, 2017 10:14 am » in ThinkPad T430/T530 and later Series - 0 Replies
- 384 Views
-
Last post by Mathelo
Fri Jan 13, 2017 10:14 am
-
Who is online
Users browsing this forum: No registered users and 6 guests




