VOGONS


Reply 40 of 46, by Predator99

User metadata
Rank l33t
Rank
l33t

Did you already try to search for a Award BIOS for this chipset? E.g. this one
http://www.amoretro.de/tag/ali-m1487m1489

I made some progress with your AMI-Bios and found a tool to decompress it:

AMIBIOS header (dated 10/10/94) found at 00000h
Module Source Dest Comp Uncmp Content
--------------------------------------------
1 18000h 0000h 4AF2h 679Ah Setup
0 00030h 0000h 5040h 6A60h POST
2 05070h 6F00h 66F0h 9100h Runtime
3 0F1E0h 0000h ----- 0E20h INIT
4 0B760h 8000h 300BhBad table

So maybe your password is already visible in clear text in one of these files..?

Attachments

  • Filename
    9181230.rar
    File size
    65.5 KiB
    Downloads
    63 downloads
    File license
    Fair use/fair dealing exception

Reply 41 of 46, by Horun

User metadata
Rank l33t++
Rank
l33t++
Predator99 wrote on 2021-05-18, 21:45:
Did you already try to search for a Award BIOS for this chipset? E.g. this one http://www.amoretro.de/tag/ali-m1487m1489 I made […]
Show full quote

Did you already try to search for a Award BIOS for this chipset? E.g. this one
http://www.amoretro.de/tag/ali-m1487m1489
I made some progress with your AMI-Bios and found a tool to decompress it:
AMIBIOS header (dated 10/10/94) found at 00000h

Great work ! Which BIOS app did you use to decompress it ?

darry wrote on 2021-05-18, 04:10:

Maybe the SRAM on the RTC chip has gone bad in such a way that the board thinks there is a password because of some stuck bits .

Good thought ! Could either be stuck bits or just bad sram that cannot be read by BIOS so it thinks there is a password.

Hate posting a reply and then have to edit it because it made no sense 😁 First computer was an IBM 3270 workstation with CGA monitor. Stuff: https://archive.org/details/@horun

Reply 42 of 46, by BitWrangler

User metadata
Rank l33t++
Rank
l33t++

I've been sporadically hunting for a page that had the good list of passwords, several more than those other pages. Old page, had all the beep codes on it too and a bunch of other useful info. Can't get a sniff of it. Anyway, going on memory, I think AMI123 was another common one that hasn't got mentioned yet.

Unicorn herding operations are proceeding, but all the totes of hens teeth and barrels of rocking horse poop give them plenty of hiding spots.

Reply 43 of 46, by Predator99

User metadata
Rank l33t
Rank
l33t
Horun wrote on 2021-05-21, 01:00:

Great work ! Which BIOS app did you use to decompress it ?

This is MyBCP from this very informative site
https://www.memotech.franken.de/NexGen/Bios.html

So my idea was that a default password is "hardwired" in the BIOS image. One should be able to modify it with
WBCP511.EXE (for core BIOS 10/10/94)

But this program seems to be lost.

If this default password is not visible in the uncompressed dumps I could search for the password check in the source and patch it out. But after this it needs to be recompressed and build into the BIOS-image. But there is no software for that so this seems to be impossible.

So I would propose to look for another BIOS of a similar board (Award). Did you look if there is a MR-BIOS?

Reply 44 of 46, by jakethompson1

User metadata
Rank Oldbie
Rank
Oldbie
kylix wrote on 2021-05-15, 11:21:
I am encountering this problem now with a PCCHIPS M918. I have absolutely no chance. CMOS resets, leaving it without a battery, […]
Show full quote

I am encountering this problem now with a PCCHIPS M918.
I have absolutely no chance.
CMOS resets, leaving it without a battery, etc. does not help.
Entering the BIOS is not possible.
All the passwords, that I tried, don't work.
Even if I use a BIOS from another Board with the same chipset, it asks for a power on password.

Does anybody have another idea?

Could you clarify the exact password prompt you are getting. Is it: Enter ROM password, enter current password, or something else?

Predator99 wrote on 2021-05-21, 08:24:
This is MyBCP from this very informative site https://www.memotech.franken.de/NexGen/Bios.html […]
Show full quote
Horun wrote on 2021-05-21, 01:00:

Great work ! Which BIOS app did you use to decompress it ?

This is MyBCP from this very informative site
https://www.memotech.franken.de/NexGen/Bios.html

So my idea was that a default password is "hardwired" in the BIOS image. One should be able to modify it with
WBCP511.EXE (for core BIOS 10/10/94)

But this program seems to be lost.

If this default password is not visible in the uncompressed dumps I could search for the password check in the source and patch it out. But after this it needs to be recompressed and build into the BIOS-image. But there is no software for that so this seems to be impossible.

So I would propose to look for another BIOS of a similar board (Award). Did you look if there is a MR-BIOS?

I experimented with roms/win486/ali1429g.amw. This is a WinBIOS, and is compressed, but not as complicated as kylix's BIOS. The ROM password check is in the uncompressed part. I was able to lock myself out of setup by replacing bytes 0x8237-0x823d with 0xFF bytes, and by changing the byte at 0xD818 from 0x74 to 0xEB. Then wipe the NVR file and boot, and it won't let you into setup. It does let me boot though. So I feel like there is actually a password sticking around in kylix's CMOS somehow. This triggers "Enter ROM password"

Reply 46 of 46, by Starej_Mraf

User metadata
Rank Newbie
Rank
Newbie

I had the same issue, there is solution. Just close JP18.

Attachments

  • IMG_7616.jpg
    Filename
    IMG_7616.jpg
    File size
    121.15 KiB
    Views
    399 views
    File license
    Public domain

One of Founding Fathers of the OldComp.cz