TEMNGT23@ysub.ysu.edu (Lou Anschuetz) (06/13/91)
Our university has been buying exclusively Everex PCs for about the last three years. Our lastest shipment for student PC labs came with quite a surprise. The new Setup routine lets you set a password on the hardware. The only way to remove this password is to take the battery out of the machine and wait until the setup information is lost. As you can imagine, putting these machines in an unsupervised student lab will soon lead to each and every one having a password on it. Argh! I immediately contacted a sales rep at Everex (a Mr. Joe Herndon (sp?)) who reported that their industrial customers demanded this feature and that they weren't about to change it for their educational customers. Well, as a first response we have cancelled all future orders for Everex machines until/unless the problem is fixed. The State of Ohio will also be removing them from our state pricing contract unless the problem is fixed (this will likely happen on June 19, 1991). In the interim, I and our purchasing department felt that other folks may wish to be made aware of Everex' new BIOS routine and the complication it may cause others where more than one person needs to have access to the machine. While I am sure this may even be a desireable feature in some industrial settings, it is certainly problematic in other settings. As the situation changes we will post additional information. You may contact via email for further info, or is there is sufficient interest, I will post more extensive information here. Lou Anschuetz Associate Director for Academic Consulting (soon to be an expert at battery pulling :-) temngt23@ysu.edu
evan@neiman.east.sun.COM (Evan Marcus (Sun NJ Sys Cons)) (06/13/91)
In article <91163.205448TEMNGT23@ysub.ysu.edu>, TEMNGT23@ysub.ysu.edu (Lou Anschuetz) writes: |> Our university has been buying exclusively Everex PCs for about the |> last three years. Our lastest shipment for student PC labs came with |> quite a surprise. The new Setup routine lets you set a password on |> the hardware. The only way to remove this password is to take the |> battery out of the machine and wait until the setup information is |> lost. As you can imagine, putting these machines in an unsupervised |> student lab will soon lead to each and every one having a password |> on it. Argh! Seems to me, all you have to do is put your own password in first. Am I missing something? -- WHO: Evan L. Marcus "It works!!" WHAT: Sun Microsystems -- a friend of mine, after telling WHERE: Paramus, New Jersey, USA me his wife was pregnant with their HOW: marcus@neiman.East.Sun.COM first child.
pjh@mccc.edu (Pete Holsberg) (06/14/91)
In article <91163.205448TEMNGT23@ysub.ysu.edu> TEMNGT23@ysub.ysu.edu (Lou Anschuetz) writes:
=Our university has been buying exclusively Everex PCs for about the
=last three years. Our lastest shipment for student PC labs came with
=quite a surprise. The new Setup routine lets you set a password on
=the hardware. The only way to remove this password is to take the
=battery out of the machine and wait until the setup information is
=lost. As you can imagine, putting these machines in an unsupervised
=student lab will soon lead to each and every one having a password
=on it. Argh!
Zenith does a similar thing. However, they were able to identify to us
the chip that the password is stored in and we had our tech simply
remove that chip from each Zenith. Perhaps Everex has a similar scheme
that someone more technical than your contact knows about.
--
Prof. Peter J. Holsberg Mercer County Community College
Voice: 609-586-4800 Engineering Technology, Computers and Math
FAX: 609-586-6944 1200 Old Trenton Road, Trenton, NJ 08690
Internet: pjh@mccc.edu TCF 92 - April ??-??, 1992
asylvain@felix.UUCP (Alvin "the Chipmunk" Sylvain) (06/14/91)
Written in article <91163.205448TEMNGT23@ysub.ysu.edu> by TEMNGT23@ysub.ysu.edu (Lou Anschuetz): > Our university has been buying exclusively Everex PCs for about the > last three years. Our lastest shipment for student PC labs came with > quite a surprise. The new Setup routine lets you set a password on > the hardware. The only way to remove this password is to take the > battery out of the machine and wait until the setup information is > lost. As you can imagine, putting these machines in an unsupervised > student lab will soon lead to each and every one having a password > on it. Argh! I'd say at first glance, that unless you have some compelling reason to stick with Everex (other than "we always have") that you go ahead and shop around for a different company. I'm assuming this is an IBM clone, yes? I'd daresay you'll find that Everex has quite a bit of competition out there. Dell has a good reputation, as does AST. I have no idea what their policy is re. sales to educational institutions, however. You might want to post and ask for opinions on what machine to buy _instead_ of the Everex. Be warned, tho, your mailbox may overflow! -- Alvin ===== asylvain@felix.UUCP ===== hplabs!felix!asylvain ===== "hplabs!felix!asylvain"@uunet.uu.net (I always try to respond to mail, if possible. If you don't hear back from me, try changing "hplabs" to "ccicpg," "spsd," or "lawnet.") DISCLAIMER: It's all in fun, folks, no flames intended. Any similarity between my opinion and that of my employer is purely coincidental and sufficient reason to change my opinion, although I'll still be right.
pal@brahms.amd.com (WHO?) (06/15/91)
In article <1991Jun13.174004.17784@mccc.edu> pjh@mccc.edu (Pete Holsberg) writes: >In article <91163.205448TEMNGT23@ysub.ysu.edu> TEMNGT23@ysub.ysu.edu (Lou Anschuetz) writes: >Our university has been buying exclusively Everex PCs for about the >last three years. Our lastest shipment for student PC labs came with >quite a surprise. The new Setup routine lets you set a password on >the hardware. The only way to remove this password is to take the >battery out of the machine and wait until the setup information is >lost. As you can imagine, putting these machines in an unsupervised >student lab will soon lead to each and every one having a password >on it. Argh! > The password is stored in the EEPROM so is some of the configurations. even if the batery is removed the password and these conf. will not be erased or reset.
jnemeth@cue.bc.ca (John Nemeth) (06/18/91)
In article <1991Jun14.201315.15848@amd.com> pal@brahms.amd.com (WHO?) writes: >The password is stored in the EEPROM so is some of the configurations. >even if the batery is removed the password and these conf. will not be >erased or reset. IBM PC's and clones do NOT use EEPROM's. They use battery backed up CMOS RAM (which is often buried in one of the ASIC's). Removing the battery will cause the password (and all the setup information) to be lost. It usually takes anywhere from a couple of hours to a day for the the information to be lost. Most machines have a jumper or a switch you can use to zap the CMOS RAM. Most machines I've seen that have password protection have the option of just protecting the system setup, or protecting system setup and booting. -- John Nemeth jnemeth@cue.bc.ca System Administrator {uw-beaver,ubc-cs,ssc-vax}! Computer Using Educators of B.C. uvicctr!cue!jnemeth