Bob,

  Do not know if this will help or not. :-)  Jim Webster

1. AMI BIOS = {Del} key during the POST.
2. Ami default passwords:
     ami
     AMI
     Ami
3. Remove the CMOS battery and let the PC sit for up to
   24 hours +/-. This will give the CMOS chip time to
   discharge (drain). Thereby losing it's data.
4. The below is a down and dirty way to disable Password
   Protection in CMOS, without destroying any of the other
   CMOS settings. The Password Protection option (Enabled
   or Disabled) is in the Advanced CMOS Setup.
   ************************************************************
   Remove one or more extended memory chips from the board.
   When you boot-up, you will see a message similiar to this
   one: "CMOS Mismatch - Press {F1} for Setup". This will
   get you into CMOS. Disable Password Protection in Advanced
   CMOS Setup. Change Extended Memory in Standard CMOS Setup.
   Then save the CMOS changes so that the computer will boot-up.
   Now reverse the memory changes by re-installing the memory
   chip and then correcting the Extended Memory values. Of
   course, make sure that the computer is OFF before fooling
   around inside of it. We all need dummy messages, I guess.
   Be sure that you write down what the actual Extended Memory
   value is before you change it!


Bob Williams wrote:
>
> I have a somewhat functional no-name 486SLC66 with AMI BIOS
>
> I'd like to get in to the setup, but it's passworded and the
> owner, of course, hasn't got a clue what the password is or who
> would even know
>
> Is there a way  to clear the BIOS password setting and get it
> to reset to some defaults so that I can get in there and set some
> hardware up.  No problem with losing important data - the poor
> machine is stripped - no H/D and 1 Meg of RAM.
>
> Can somebody advise - or am I dead in the water?
>
> Thanks in advance.
>
> Bob
>

To unsubscribe from SURVPC send a message to [EMAIL PROTECTED] with 
unsubscribe SURVPC in the body of the message.
Also, trim this footer from any quoted replies.

Reply via email to