Saturday 26 September 2015

breaking Windows Password

Resetting Windows Password

Thu, Jun 3, 2010
Tested on: NT 3.51, NT 4 (all versions and SPs), Windows 2000 (all versions & SPs), Windows XP (all versions, also SP2 and SP3), Windows Server 2003 (all SPs), Windows Vista 32 and 64 bit (SP1 also), Window 7 (all variants). Some also say that it works on Windows Server 2008 too.
If used on users that have EFS encrypted files, and the system is XP or Vista, all encrypted files for that user will be UNREADABLE! and cannot be recovered unless you remember the old password again. If you don’t know if you have encrypted files or not, you most likely don’t have them (except maybe on corporate systems).
Boot your computer with Hiren’s BootCD and follow the steps below for resetting your password:

1. Enter “Offline NT/2000/XP/Vista/7 Password Changer”

With Up & Down keys select Offline ‘NT/2000/XP/Vista/7 Password Changer’ and press Enter.

2. Wait for “Offline NT Password & Registry Editor” to Load

On the screen below, you’ll see is several lines of text that quickly run down the screen. You don’t need to do anything here. Wait for “Offline NT Password & Registry Editor” to load.
1. Select "NT/2000/XP/Vista/7 Password Changer"
2. Linux files are loading...

3. Choose the Correct Hard Drive Partition

This step in the Offline NT Password & Registry Editor process is to select the partition that contains the Windows installation that you want to delete a password from.
Many computers have a single operating system installed on a single partition on a single hard drive, making this a very easy choice.
If that’s the case for you, just press ENTER to accept the default partition. Otherwise, type the number corresponding to the correct partition from the Candidate Windows partitions found list and then press ENTER.
If more than one partition is listed and you’re not sure which one to pick, chances are the larger partition is the one with Windows installed.
Every Windows 7 PC will have more than one partition listed.

4. Confirm the Windows Registry Path

Offline NT Password & Registry Editor now needs to know the exact location of the Windows Registry. Except in the rarest of occasions, the default location will be the correct one.
Just Press ENTER to accept the default Windows Registry path without writing anything else.
3. Choose the Correct Hard Drive Partition
4. Confirm the Windows Registry Path

5. Choose the Password Reset Option

Offline NT Password & Registry Editor is now asking which part of the registry it should load.
Press ENTER to accept the default choice of Password reset.
The Offline NT Password & Registry Editor tool can perform various functions aside from resetting passwords but since that’s the focus of this particular walkthrough, that’s all we’ll discuss.

6. Choose the Edit User Data and Passwords Option

Now that the registry is loaded and available to the program, Offline NT Password & Registry Editor needs to know exactly what you want to do.
Press ENTER to accept the default choice of Edit user data and passwords.
This will load the necessary options for the actual password reset.
5. Choose the Password Reset Option
6. Choose the Edit User Data and Passwords Option

7. Enter the Username to Edit

Offline NT Password & Registry Editor now needs to know which user’s password you’d like to delete (erase, clear, blank, remove, call it what you like).
A default user is listed between the brackets at the prompt. In the above example, you can see that it’s the Administrator user.
If the default user is the user you’d like to remove the password from, simply press ENTER. Otherwise, enter the username and then press ENTER.

8. Type 1 to Clear (blank) user password and then press ENTER

At the bottom of the screen you’ll see the User Edit Menu with several options to choose from.
Type 1 for Clear (blank) user password and then press ENTER.
Offline NT Password & Registry Editor shows some interesting information about the username you entered in the last step – the full name, what groups the user belongs to, how many failed login attempts have taken place, how many total logins have been completed, and more.
If you see a check in the “Passwd not req.” box, this means that a password is not a requirement for this particular user. It does not mean that a password is not required to access the account in Windows. In other words, it’s saying that it is possible to erase this user’s password.
7. Enter the Username to Edit
8. Type 1 to Clear (blank) user password and then press ENTER

9. Type ! to quit the User Edit Tool

Assuming there weren’t any problems, you should see a Password cleared! message after entering 1 in the previous step.
Type ! to quit editing user and then press ENTER.
You must confirm these changes in a later step before they are actually complete. If you quit Offline NT Password & Registry Editor now then the password reset will not take place!

10. Type q to Quit Offline NT Password & Registry Editor

Enter q and then press ENTER to quit the Offline NT Password & Registry Editor registry editing tool.
Important: You’re still not done! You need to confirm your password reset change in the next step before it will take effect.
9. Type ! to quit the User Edit Tool
10. Type q to Quit Offline NT Password & Registry Editor

11. Type y and then press ENTER to confirm Password Reset Changes

At the Step FOUR: Writing back changes menu, Offline NT Password & Registry Editor asks if you want to write file(s) back.
Type y and then press ENTER.
You should see an EDIT COMPLETE message appear on screen. If you do, it means that Offline NT Password & Registry Editor has written the password changes to your computer!

12. Confirm That You’re Finished Using Offline NT Password & Registry Editor

Offline NT Password & Registry Editor gives you an option here to rerun the program. If you’ve been following along with this guide and everything seems to have worked properly then there’s little reason to repeat anything.
Press ENTER to confirm the default option of not rerunning the password reset.
11. Type y and then press ENTER to confirm Password Reset Changes
12. Press ENTER to Confirm That You're Finished Using Offline NT Password & Registry Editor

13. Remove Hiren’s BootCD and Restart the Computer

That’s it! You’ve just completed the entire Offline NT Password & Registry Editor password removal process.
13. Remove Hiren's BootCD and Restart the Computer
Note: If you receive a “job control turned off” or a “can’t access tty” error, don’t worry. As long as the EDIT COMPLETE confirmation message was posted to the screen after you confirmed the password reset changes then your password was successfully reset. You should still be able to see the confirmation on the screen at this point.
Remove Hiren’s BootCD from your CD/DVD drive and then manually reset your computer.
In the next step, you’ll finally get to logon to Windows without entering a password!
Now that your password has been removed using Offline NT Password & Registry Editor, no password is required to log on to Windows.
If you are the only user on your computer, Windows will boot all the way to the desktop on the next reboot and will skip the logon screen altogether.
If you’re on a multi-user computer (as many families are), the logon screen will still appear after starting Windows but when you click on the user that had the password removed, you will not be prompted for a password and will instead enter Windows automatically.
Having a secure password is important so please don’t continue to use Windows without one. As soon as you’ve gained access to your computer again, configure a new password – one you can remember a little easier!

hirens boot cd (how to use it)

How to disinfect -almost- any infected computer using Hiren’s BootCD.

As the volume of malware programs is growing extremely fast in the last years, it is difficult for antivirus programs to deal with them. This happens because every antivirus program must update its database with the new virus signature (first) in order to disinfect an infected system or to prevent a system from being infected. 
Apart from that, there is another problem that has appeared in the last year: the appearance of ransomware software that once it infects a computer, it prevents the user to use it in all Windows modes (Normal, Safe Mode, Safe Mode with Networking) and, as a result of that, the user cannot disinfect his PC. A well known example of this type of ransomware is the FBI Moneypack Virus or FBI Virus or Police virus. For all these reasons, I decided to write a removal guide to disinfect your computer from almost any malicious program (Virus, Trojan, Rootkit, etc.) or ransomware program that prevents you from using your computer.
To be able to clean your infected system, first of all you need a clean bootable media CD (or USB) image in order to start your computer in a clean environment and then disinfect it from malware. For that reason, in this guide, I use the Hirens BootCD media, because it contains a clean bootable image integrated with some amazing free antimalware and cleaning utilities that can help you easily disinfect your computer from any malware.
In this tutorial you can find instructions on how to use Hirens BootCD to disinfect any computer system.

How to disinfect an infected computer using Hiren’s BootCD.

Step 1. Download Hiren’s BootCD

1. Download Hiren’s BootCD to your computer.*
* Hiren’s BootCD Official Download page: http://www.hirensbootcd.org/download/
Scroll the page down and click on “Hirens.BootCD.15.2.zip” )
image_thumb7_thumb
2. When the Download is complete, right-click on “Hirens.BootCD.15.2.zip” file to extract it.
image_thumb11_thumb

Step 2: Burn Hirens BootCD into an optical disk.

Note: If you don’t have a CD/DVD drive on your computer (e.g. if you own a netbook) then follow this guide: How to put Hirens BootCD into a USB stick.
1. In “Hirens.BootCD.15.2” folder, find the “Hiren’s.BootCD.15.2.ISO” disc Image file and burn it to a CD.
image_thumb16

Step 3: Boot the infected computer with Hirens.BootCD.

1. First, make sure that your DVD/CDROM Drive is selected as first boot device in BIOS (CMOS) Setup. To do that:
  1. Power On your computer and press “DEL” or “F1” or “F2” or “F10” to enter BIOS (CMOS) setup utility.
    (The way to enter into BIOS Settings depends on the computer manufacturer).
  2. Inside BIOS menu, find the “Boot Order” setting.
    (This setting is commonly found inside “Advanced BIOS Features” menu).
  3. At “Boot Order” setting, set the CD-ROM drive as first boot device.
  4. Save and exit from BIOS settings.
2. Put the Hirens Boot CD on the infected computer’s CD/DVD drive in order to boot from it.
3. When the “Hiren’s BootCD” menu appears on your screen, use your keyboard arrows keys to highlight the “Mini Windows Xp” option and then press “ENTER
image_thumb18

Step 4. Delete Temporary files.

In this step we proceed to delete all contents from infected system’s temporary folders: “Temp” & “Temporary Internet Files”.
* Note:Temp” & “Temporary Internet files” folders are created and used by Windows to store temporary files that are created by Windows services or other software programs (e.g. “Internet Explorer”). These folders are also used by malware programs (viruses, Trojans, adware, rootkits, etc.) to store and execute their malicious files. So, when we delete the contents of these folders, we remove all scrap files and also all potentially malicious files, without affecting computer operation at all!
First let’s find out the main local disk’s drive letter. The main local disk is the disk where Windows are installed on. To do that:
1. From “Mini Windows XP” desktop, double-click at Windows Explorer icon.
1dxi5gbq
When Windows Explorer opens, you should see all the drives that installed on your system. The list includes the Hirens BootCD drives (“RamDrive”, “HBCD 15.2” & “Mini Xp”) and your local disk drive (or drives).
For example in a Windows XP based system with one hard disk installed on it, you should see the following drives:
  • (B:)  RamDrive
  • (C:) Local Disk
  • (D:) HBCD 15.2
  • (X:) MIni Xp
mini-xp-explorer
2. In the above example the main local disk is marked with letter “C”. If you see more than one “Local Disk” listed on your computer, then you have to explore all “Local Disks” contents, until you find in which “Local Disk (Drive Letter)” Windows are installed.
tbtcemjv
3. When you find out, the main local disk drive’s letter, navigate to the following locations and delete all contents found inside the “TEMP” and “Temporary Internet Files” folders.
Windows XP:
C:\Temp\
C:\Windows\Temp\
C:\Documents and Settings\<USERNAME>\Local Settings\Temp\
C:\Documents and Settings\<USERNAME>\Local Settings\Temporary Internet Files\
C:\Documents and Settings\Default User\Local Settings\Temp\
C:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\

Windows 8, 7 & Vista
C:\Temp\
C:\Windows\Temp\
C:\Users\<USERNAME>\AppData\Local\Temp\
C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\Temporary Internet Files\
C:\Users\Default\AppData\Local\Temp\
C:\Users\Default\AppData\Local\Microsoft\Windows\Temporary Internet Files\
C:\Users\All Users\TEMP\
4. Also clear the contents of “Temp” & “Temporary Internet files” folders for any other user that using the infected computer.
5. Close Windows Explorer.

Step 5. Activate Mini Windows XP Network connection.

Now we ‘re going to activate the network connection in order to be able to connect and download files from the Internet.
Attention: If you work on a laptop computer, then connect your laptop to network by using an Ethernet cable before you continue to this step.  “Network Setup” utility doesn’t recognize properly the Wi-Fi cards,
1. From “Mini Windows XP” desktop double-click at “Network Setup” icon.
mini-xp-network-setup
2. When “PE Network Manager” starts, drag and leave your mouse on “State” sign to check if your computer is connected (to the network).
tvt40mrh
3. After that, make sure that your network card has obtained a valid IP Address. To do that click the “Info” button.
3nzfsye5
4. At “Network DHCP information” window you must see a similar screen:*
* Note: The “IP Address”, “Subnet Mask”, “Default Gateway” and “DNS Server” fields numbers may differ on your computer.
jyhg1wn1
If the “IP Address”, “Subnet Mask”, “Default Gateway” and “DNS Server” fields are empty, then you won’t be able to connect to the network. If this happens, check your cables or specify manually the Network Address settings. **
ikktj5fn
**In order to manually specify your Network settings, from the main “PE Network Manager” window, click “Obtain an IP address automatically”.
zmp1pmm1
Type manually your “IP”, “Subnet Mask”, “Default Gateway” and “DNS Server” addresses and click “Apply”.
g5bdn3k5
5. Close “PE Network Manager” utility.


Step 5. Disinfect the infected computer with RogueKiller.

1. From Mini Windows XP desktop, double-click at “Internet” browser icon.
stw1oeev
2. Navigate to “http://www.adlice.com/softwares/roguekiller/” and scroll the page down until you find and click the  “RogueKiller” download link. *
* Note: You can also find the “RogueKiller” download page from “www.wintips.org” website (Under “Tools & Resources” section).
rcx53umg
3. At the pop-up window, click “Run” to run “RogueKiller.exe” file.
image
4. When the pre-scan is completed, read and “Accept” the license terms.
xinzx0zr
5. Press the “Scan” button to scan your computer for malicious threats and malicious startup entries.
t4ydfgeg
6. Finally, when the full scan is completed, press the “Delete” button to remove all malicious items found.
image
7. CloseRogueKiller” and continue to the next step.

Step 6. Remove Malware with Malwarebytes Anti-Malware.

1. From Mini Windows XP desktop, double-click at “HBCD Menu” icon.
hbcd-menu
2. At Hiren’s BootCD 15.7 – Program Launcher window, go to “Programs” > “Antivirus/Spyware” and click  “Malwarebytes’ AntiMalware”.
jewewdma
3. Press any key when the following screen appears.
t2nudzgk
4. When “Malwarebytes’ Anti-Malware” appears on your screen, select the “Update” tab and click “Check for Updates”.
1q3xgt0s
5. When the update is completed, press “OK” to close the information pop-up window.
tfxk55oc
6. Now click the “Scanner” tab.
eewvrliu
7. Click to activate the “Perform full scan” option and then press the “Scan” button.
qbxurdpy
8. At the next screen leave only your main local disk drive’s letter selected (e.g. “C” in this example) and unselect all other drives listed. Then press the “Scan” button.
allzxpgb
9. Wait until Malwarebytes Anti-Malware scan your computer for malware.*
* Note: When the program finds threat objects, you ‘ll see that “Object detected” field becomes red counting the infected items as the scanning procedure continues.
lwih52p2
10. When the scanning is completed, press the “OK” to close the information window and then press the “Show results” button to view and remove the malicious threats.
jodfs5by

11. At the “Show Results” window check – using your mouse’s left button- all the infected objects found EXCEPT the following three (3) objects:
  1. Malware.Packer.Gen  |  File  |  X:\I386\System32\keybtray.exe
  2. Malware.Packer.Gen  |  Memory Process File  |  X:\I386\System32\keybtray.exe
  3. PUM.Hijack.Help   |  Registry Data  | HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer|NoSMHelp
sjkwkosb
12. Finally press the “Remove Selected” button to disinfect your computer.
rwczm5el
13. When the removal of infected objects process is complete, answer “Yes” to “Restart your system & remove all active threats properly” and then remove the “Hirens BootCD” from the CD/DVD drive in order to boot normally into Windows.
qbqfmgoe
14. When Windows are loaded, ensure that your computer is totally disinfected from malicious programs by following the steps in this guide: Malware Removal Guide to clean your infected computer.
If you want to stay constantly protected from malware threats, existing and future ones, we recommend that you install Malwarebytes Anti-Malware PRO by clicking below (we do earn a commision from sales generated from this link, but at no additional cost to you. We have experience with this software and we recommend it because it is helpful and useful):

CMOS (complimentary metal-oxide semiconductor)

CMOS (complementary metal-oxide semiconductor) is the semiconductor technology used in the transistors that are manufactured into most of today's computer microchips. Semiconductors are made of silicon and germanium, materials which "sort of" conduct electricity, but not enthusiastically. Areas of these materials that are "doped" by adding impurities become full-scale conductors of either extra electrons with a negative charge (N-type transistors) or of positive charge carriers (P-type transistors). In CMOS technology, both kinds of transistors are used in a complementary way to form a current gate that forms an effective means of electrical control. CMOS transistors use almost no power when not needed. As the current direction changes more rapidly, however, the transistors become hot. This characteristic tends to limit the speed at which microprocessors can operate.

Bios (basic input output system)


The BIOS
 
Overview:
As I mentioned earlier, the computer without software (or firmware) is essentially useless. For most of our day to day use, the main operating system (Windows, Linux...) determines the capabilities of a computer. Before the computer can access the main OS, it's going to need a little help. The basic instructions that a computer uses to get up and running are contained in the BIOS (basic input/output system). The information in the BIOS allows the computer to interface with the monitor, keyboard and mouse (among other things) until the OS can take over. The BIOS is stored on a small IC that has a small amount of flash memory. That memory is used to store the values entered when you set up the computer's BIOS parameters. This page shows some of the various setting and will tell, briefly what the setting affect in the computer's operation.

    Notes:
  • Before I go any further, I should tell you that you should not go into the BIOS unless you either know what you're doing or you're working on a computer that is unimportant to you or anyone who may need it. While it's relatively difficult to destroy data by changing values in the BIOS, it IS easy to make changes that would prevent the computer from booting.

  • Generally, there is no mouse capability in the BIOS. Most all interaction uses the up/down arrows, the page up/down buttons and the ENTER key. Some of the newer motherboards have mouse capability but can be navigated with the arrow keys as well. If you're going to buy a motherboard and want to be able to use a mouse when working with the BIOS presets, look for one with a UEFI BIOS interface.

  • To get to the BIOS screen, you have to follow the instructions when the computer just starts to boot. For many motherboards, you hit the delete key to enter the BIOS. Other BIOS' use F1, F2 and F10 just to mention a few.

  • As you can see, this BIOS is for a motherboard purchased in 2005. Both newer and older motherboards will have different options/features. This motherboard uses a Phoenix BIOS. Others may have a different type of BIOS and may look significantly different. For most motherboards, the owner's manual is available online at the manufacturer's web site. The BIOS section of the manual will tell you what you need to know about the BIOS settings. If you're unsure, you can almost always find help on one of the computer forums like the Major Geeks forum.
This is the first page you'll see when you get into this particular BIOS. The appearance and features of the various BIOS configurations from various manufacturers vary significantly. This is a Phoenix/Award BIOS. Some computers use an AMI BIOS. Other computer manufacturers produce their own BIOS software/firmware.
Above, you can see that the 'Standard CMOS Features' is selected. If you hit the ENTER key, you get the screen below. This is the screen where you set the system clock and set several of the drive parameters. Luckily, most of the newer BIOS' set/read the drive parameters automatically.
On the screen above, I scrolled down to the 'Primary IDE Drive' and hit ENTER. The next screen is the result. In this machine, the primary IDE drive is a 40GB Samsung drive. The screen shows the various drive parameters. Here, we want to let the BIOS set the parameters if the drive is capable. Some older drives don't have the capability to communicate that information to the BIOS and the parameters have to be set manually. Thankfully, most of the older drives have been taken out of service.
Next, we scroll down to what is simply labeled 'BIOS Features' and click ENTER.
Here you can see some relatively new/unique BIOS features. Super-boot allows the computer to start faster by storing certain basic system information in memory. The Super BIOS protect protects the computer's BIOS information from malicious software that tries to destroy the BIOS data. If the BIOS information is completely destroyed, the computer can not be booted and, if the BIOS IC isn't replaceable (installed in a socket vs soldered in place), the motherboard has to be replaced. The SuperRecovery allows you to partition off the drive in a way that nothing can access it from the OS (nothing -- not partitioning software or malware -- nothing). It is supposed to offer the highest level of protection for your data. The
This is an image of the initial SuperRecovery screen.
The next feature is the SuperSpeed feature. It allows you to increase the speed of the processor but you have to be careful. If you set it too high, your computer may become unstable, it may be unable to boot and/or it could overheat. If you ever make a BIOS change that prevents the computer from booting, you can clear the CMOS memory with the 'clear CMOS' jumper. Generally, this presents no serious problem (except for all of the settings going back to the default settings). However, in some cases where a RAID array is set up in the BIOS, the recovery takes longer. If you're working with a RAID, it may take several trips through the BIOS and several reboots to get things back in order (don't ask me how I know :).
Below is a picture of the 'clear CMOS' jumper (inside the dotted yellow line). It's generally very near the BIOS IC. If you ever need to clear the CMOS memory, you simply remove power from the computer, move the jumper from pins 1 and 2 to pins 2 and 3. After a second, return the jumper to pins 1 and 2 and restart the computer. The BIOS settings will now be as they were when you initially powered up the machine. In the following image, the green arrow points to the BIOS IC. On this board, it's soldered directly to the board but these are often installed in sockets to allow quick replacement. The orange arrow points to the backup battery. This retains the CMOS settings when no power is applied to the motherboard. The battery rarely needs replacing but if you're working on an old machine, you should check it to confirm that its voltage is approximately the rated voltage (generally 3v). The yellow arrow points to the clear CMOS header. As you can see, a shunt is installed across pins 1 and 2. If you're unsure about the pin numbering on a header, there are often indicators like the white triangle (red arrow). On this board, there is also a number 3 but there aren't always numbers.
The image above is a Flash graphic so you can right-click and zoom in on it.
You can click HERE to open it in a new window.
A couple more notes about the CMOS. As was stated previously, clearing the CMOS memory restores the system to what it was when the system was powered up for the first time. Generally, the computer will function after clearing the CMOS but for advanced systems there are some things you should know.

  • Any over-clocking settings will be lost. This won't cause any problems but could be annoying if you have to find the sweet-spot for the system.

  • If you're running a RAID hard drive configuration, clearing the CMOS will remove the RAID settings and the system will not boot until the RAID array has been reconfigured. If this happens and you don't know how to reconfigure the RAID array, try to find someone who does. If you were running a RAID array, it was likely done for a reason (security against hard drive failure or for better performance). If you reload the operating system on one of the drives (because you can't reonfigure the array), you will lose the benefit of the array and will lose all information on the drives.

  • If you can't find the clear CMOS jumper/header, look for the battery. The header is almost always near the battery (large silver coin-cell battery). On some motherboards, there is an alternate way to clear the CMOS. On THIS motherboard, you can see that there is a switch on the back of the board. This is convenient but you have to be aware that it's there if you're reaching around the back of the computer trying to plug something in. If you accidentally push the button, it will clear the CMOS.
Here, we scrolled down to the 'Advanced BIOS Features' and clicked enter.
There are too many features here to cover them all but you should notice a few. At the top, you can see that the virus warning is ENABLED. The 'quick POST' is enabled (allowing even faster booting). Below that, you can see that you have options for the boot order of the various drives. Here, we have told the computer to boot to the CD ROM first and if you don't find a boot record, boot from the hard drive. To shave a few seconds off of the boot time, you can have it boot to the hard drive first but if you need to run something like True Image recovery, you will need to go into the BIOS and set it to boot from the CD ROM first.
Next, we enter the 'Advanced Chipset Features'.
And on the 'Advanced Chipset Features' page, we enter the DRAM control page.
Here, we can control the FSB (Front Side Bus) clock frequency. If we set it higher than the CPU's rated FSB clock frequency, the system may run somewhat faster but it may also become unstable (crashing/locking up). You may also notice the SPD entries. SPD stands for Serial Presence Detect. The SPD is information about the memory. This information is used by the BIOS to set the proper memory parameters.
In the DRAM clock section, you can see that there are three choices. In some situations, you may want to overclock/underclock the memory. Here, there is no overclocking. For the best stability, you should set it to 'By SPD'.
Below, you can see the 'DRAM Timing' dialog box. The 'timing' is the number of clock pulses between certain events in the memory's operation. When overclocking, these numbers become important in getting the best possible performance. For this computer, the best setting is 'Auto By SPD'.
The 'Integrated Peripherals' page deals with the parameters of the drive and PCI controllers.
Here, we enter the IDE device page.
Below, you can see several of the choices. Some drives have to operate in PIO (Programmed Input/Output) mode and others can operate in DMA mode. All of the settings are set to auto here. When a drive operates in PIO mode, all of the data passes through the processor. In DMA (Direct Memory Access), the processor is bypassed and the drives can communicate with the memory directly. This is much more efficient and it frees up the processor.
This page allows you to enable/disable several functions. The specific functions that you'll need are dependent on the system you're building.
Here, we will enter the Super IO page.
The Super IO IC is the interface between the southbridge and the serial, parallel and IR (InfraRed) ports.
Below, we enter the 'Power Management' section.
Here, we can determine how/when the computer shuts down after a period of inactivity. This page allows you to control the way the computer shuts down. There are options for when you use the power button to shut the computer down and when the computer is shut down automatically.
Here we enter the PNP (Plug and Play) page.
On this page you can see a setting that needs to be changed. The PNP OS should be set to no. This seems counterintuitive (it is actually, if you ask me). When set to yes, the BIOS leaves it to the OS to resolve IRQ conflicts. This is better done outside of the OS so the proper setting should be no.
Here we enter the 'PC Health Status' page.
This page tells you several things including the processor's core temperature, the system temperature, the operating speed of two fans and two of the power supply voltages. The CPU core voltage is not produced directly by the computer's switching power supply. It is converted from one of the power supply outputs by a switching regulator. You should remember the pictures earlier of the PWM FETs that were located near the CPU socket.
Note: When starting a newly assembled system, it's a good idea to visit this page (above) as soon as you boot the system. If the CPU temperature is above ~60c, there is very likely you haven't properly mated the heatsink to the CPU. While it's possible for a processor to run at 60c (60 degrees celcius) under a heavy load, it should not run that hot at idle. If your processor is running hot, shut it down and check the heatsink mounting. If you can't see it directly, a small mirror and a flashlight will usually help. Be sure that the computer is unplugged from the wall outlet when you are working inside the cabinet. While there is only low voltage present, if you accidentally short anything with the system powered up, you may do serious damage. Remember that there is at least one 5 volt supply that has voltage even when the computer is off.
Here we enter the 'Frequency/Voltage Control' page.
The 'auto Detect' setting determines whether the system clock (oscillator not time clock) is on or off when there is no memory or PCI card in the slot. The 'Spread Spectrum' setting controls whether the clock frequency is constant or varying. When the clock frequency remains constant, more energy is concentrated at one frequency and therefore more likely to produce interference in other devices.
The 'Load Fail-safes' option will set all of the BIOS parameters to the settings that are least likely to cause problems. If set to the fail-safes, the system will not perform up to its full potential.
This is similar the the fail-safes settings but it sets the BIOS parameters to those which are most likely to provide the most stable operation.
To save the new values and exit, you can either scroll to here and hit ENTER or you can hit F10.
When it asks you if you want to exit and save, you must enter 'Y' instead of 'N'.
Flashing the BIOS:
Most motherboard manufacturers offer a way to update the programming/features (called firmware) of the BIOS. Updating the BIOS is referred to as 'flashing' the BIOS. It's often necessary when a new line of processors comes on line or when a new, larger hard drive becomes available. Remember that some motherboards stay in service for a very long time. Having the ability to update the BIOS' firmware prevents you from having to replace a motherboard when the next generation of peripherals becomes available.
Note: Flashing the BIOS can be dangerous. If power fails or you get a 'bad flash', your motherboard could be rendered useless. It's only advisable to update the firmware when absolutely necessary. Even then, you should use a UPS (Uninterruptable Power Supply) to protect against power failure.

Raid Setup
The following is not exactly a step_by_step tutorial but it will show you basically what's involved with a raid setup. If Windows (or any operating system) is to be installed on the RAID array, this must be done BEFORE the installation of the OS. On the 'XP Installation page', I show how the SATA RAID drivers are installed but this is different. This sets up multiple drives to act as one drive (in the case of a RAID 0 configuration). The driver installation on the XP installation page gives Windows the information it needs to operate the SATA interface. In this case, the SATA interface is where the RAID drives will be connected to the motherboard. There are some boards where the IDE drives can also be used in the RAID array but that's not possible with this board.
    Notes:
  • This setup is for a different computer than the one used above. It has a different BIOS (AMI instead of Phoenix).
  • Your RAID setup will likely be different than this unless you're using the same chipset/BIOS.
  • When setting up a pair of drives in RAID 0, the Windows will no longer see them as two drives. As far as Windows is concerned, they are a single drive. The only way it will show up as two drives is if you partition the drive.
When your computer boots, it will get to a screen that allows you to enter the RAID setup utility. If it doesn't, you may have to enable it in the BIOS. This one was set up to automatically display the option to enter the utility. It doesn't stay on this page for long so you have to be ready to hit whatever key is required to enter the utility. Here, the 'tab' key is used.
When you enter the utility, you will see something similar to the following screen. Here, you will select the drives you want to use in the array and you will choose the type of array (RAID 0 was chosen for this array). When you finish here, you will need to reboot.
After rebooting, on this computer, I had to go into the BIOS (after setting up the RAID array) and set the boot priority. I couldn't select the array BEFORE it was set up. That's why we had to reboot to setup this option. Here, I went to the BOOT tab and scrolled down (arrow keys) until I selected the 'Boot Device Priority' option. Then I hit the enter key to enter the boot priority page.
I want it to boot to the array so I set it as the first on the list. As you can see, the array is listed twice. It doesn't matter but ideally it would only be shown once. The third selection should be CD ROM (if that's what you want) and the fourth would be blank or disabled. When booting, the computer looks for the OS on the top drive. If it's not found, it continues looking for a bootable OS until it finds one or until it runs out of choices.
After making the desired changes, make sure you save them. You will exit the BIOS as we did on the previous BIOS example (F10). Be sure that you choose the 'Y' option instead of the 'N' option.
    Notes:
  • If you don't see a RAID array listed and instead you see the individual drives that you set up (or tried to set up) as an array, the array is not properly configured and you need to go through the procedure again.
  • If you're installing the system with only one drive or array and there is only 'one' copy of the OS, the computer will probably select the proper drive as the boot drive. In my case, I had the OS previously installed on a single drive (the Maxtor listed) and then installed it on the array. Having two copies of the OS confused the BIOS and caused it to boot to the wrong drive (until I went to the page below and set it to boot to the correct drive).  
     
     
     
     
     
     
    


    You May Be Interested in My Other Sites
    • This site was started for pages/information that didn't fit well on my other sites. It includes topics from backing up computer files to small engine repair to 3D graphics software to basic information on diabetes.
    • This site introduces you to macro photography. Macro photography is nothing more than the photography of small objects. It can take quite a while to understand the limitations associated with this type of photography. Without help, people will struggle to get good images. Understanding what's possible and what's not possible makes the task much easier. If you need to photograph relatively small objects (6" in height/width down to a few thousandths of an inch), this site will help.
    • If you're interested in air rifles, this site will introduce you to the types of rifles available and many of the things you'll need to know to shoot accurately. It also touches on field target competition. There are links to some of the better sites and forums as well as a collection of interactive demos.
    • This site is for those who want to install or update their car stereo. It begins with the most basic electronics theory, progresses into basic transistor theory as well as covering virtually everything associated with car audio.