59

My friend gave me their old laptop before they left town. I was going to install linux on it and use it for a server.

I have basically given up doing anything because the BIOS is locked with a Secure Boot supervisor password which I guess they forgot about being there.

I've sent a message asking if they happen to remember it and would feel comfortable sharing it if it is not one they use for anything else. But the odds of both those things being the case are slim and I don't feel good about trying to get someone to share any password. Especially since it was so kind to just give me the machine in the first place. It's not practical to physically get the device and the person together in the near future.

It's impossible (or past my skill level) to install linux on this thing without the freaking password. I did manage to install windows. Last time I did that it was win2k. It will boot OK but I can't use that to circumvent the lock. But Ubuntu and a couple other distros are no gos.

It is so fucked that computers can be rendered bricks like this. Obviously yet another way to design in obsolescence disguised as a security feature. Encryption is one thing; this is independent of any data.

Gaaaaaah I spent most of the weekend trying to install linux on this otherwise perfectly functional machine. I think it's toast though.

you are viewing a single comment's thread
view the rest of the comments
[-] buckykat@hexbear.net 15 points 1 year ago

It's not really likely to fry anything. The CMOS battery is separate from the device's regular batteries, it's usually a little watch battery, there to keep bios settings and run the clock.

[-] Zvyozdochka@hexbear.net 12 points 1 year ago

glans is probably talking about jumper pins located on the board to reset the password, which could cause some troubles if you jump the wrong pins, though probably not complete machine death.

[-] buckykat@hexbear.net 7 points 1 year ago

Those are also unlikely to fry things. Online tutorials, especially ones from software guys, are really overscared of physical damage from opening machines and poking the insides.

[-] isame@hexbear.net 14 points 1 year ago

Listen hardware is scary okay?

[-] buckykat@hexbear.net 4 points 1 year ago

It's actually pretty hard to physically ruin computer hardware if you're not actively trying to

[-] isame@hexbear.net 7 points 1 year ago

I know, I know. But I can't revert inserting my CPU backwards.

For the record I've never done that. I just forgot the collar so was just rawdogging my CPU onto the board. Fortunately I didn't ruin anything somehow.

[-] buckykat@hexbear.net 5 points 1 year ago

Worst thing that'll happen from running a CPU with no cooler is it'll detect that it's getting too hot and shut down before it can damage itself, CPUs have had temperature sensors built in for a long time now.

I caught a graphics card on fire once by plugging in a too powerful power supply. I am not a smart man

[-] glans@hexbear.net 3 points 1 year ago

it was something to do with a paperclip

[-] Shinji_Ikari@hexbear.net 2 points 1 year ago

Usually these things are stored on an EEPROM chip on the motherboard. You can absolutely burn out the eeprom, bricking the machine until you can find someone who can do surface mount rework.

[-] glans@hexbear.net 3 points 1 year ago

Ya sorry by both batteries I mean the main battery and the CMOS battery

this post was submitted on 01 Nov 2023
59 points (100.0% liked)

technology

23239 readers
448 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 4 years ago
MODERATORS