KILLCMOS v.1.0
This is a rather quick revamp of the DOS KiLLCMOS Documentation.
All is valid, just added a Win95/NT 32-bit "Shell" for KiLLCMOS.
Depending on the version (installable w/ setup.exe , or just the basics),
You should either run SETUP.EXE to Install or Copy all KiLLCMOS32 files
into a directory of your choice. RUN KiLLCMOS32 to start.
What is it?
KillCMOS basically "resets" your computer's CMOS settings to the factory
defaults. Works with ALL CMOS. KiLLCMOS only changes checksums & values
that makes the motherboard CMOS revert back to factory defaults.
** IT DOES NOT ReProgram your CMOS like a FLASH ROM Writer does.
** IT DOES NOT DAMAGE Hardware. KiLLCMOS reads/writes to areas of the
CMOS that gets written to everyday, the difference is the VALUES that
we give it(cmos).
Reset CMOS, Why?
*scenerio one*
I work in the Computer industry and often the CMOS needs to be manipulated,
but someone has passworded the setup. "Gee", the customer says, "How'd that
get there, We don't know anything about a PASSWORD?" This was why I wrote
the program.
Sometimes, Computer-wannabe-twits deliberately forget to tell
me that they have passworded their systems, just so that I'll have to call
and ask them for it. What dumb-asses!!, the response I used to get
sometimes was "What?, You can't Hack it?".
Yeah, I can hack it *******. Well, anyway. Now, my crew at work doesn't
have to hear that **** anymore. Now, its us telling them..." BTW, you'll
have to re-set your Password. We had to Kill it to FIX your Computer."
*Chump*
BTW, yes, I have AW, AMI, AMIDECODE, PASS, PASSWORD, PASSOFF, and
they all work on MotherBoards circa 1988-1994. Haven't seen one of these
programs crack a password for a year and a half.
*scenerio two*
Sometimes, a motherboard's CMOS settings will get corrupted due to a
power-flux or just because it felt like it. The Level of corruption may
keep you from even into the CMOS menu.
O.K., I get it, But How does it do it?
KiLLCMOS is a direct descendant of my first Bios Resetter, CLRCMOS.
CLRCMOS changed one Checksum in CMOS. 64 byte .COM file that would
work on 100% of the computers from 1987 until 1994. Around '94 ,
More Bioses strayed from the IBM CMOS manifesto, in you will, and started
making their CMOS larger & more proprietary. Sooo.. CLRCMOS started
to fail in its tasks( killing CMOS/PASSWORDS). It seemed CLRCMOS would
reset the CMOS, but still leave the PASSWORD & its "Check at setup" Bit
intack, therefore leaving me with having to drain the battery to enter the
CMOS.
This is where KiLLCMOS come into play. Where CLRCMOS took a Sniper's shot
at your computer's CMOS Checksum (1 byte), KiLLCMOS takes a Shotgun blast
to your CMOS. KiLLCMOS changes the values in ALL KNOWN proprietary
Checksum locations. Then, it changes (overwrites) ALL KNOWN Password
& their accompanying Checksums.
End Result. Computer Reboots, Says "CMOS Checksum Failure, Default
Settings Loaded..."
Now its time to reconfigure your motherboard to your specific hard-drives,
floppies...etc.
OK. I'm ready, How do I do it?
Just execute KiLLCMOS.COM . You can run it from a floppy, or from
Windows 3.x/Win95. I haven't tested WIN NT with it yet though.
In Windows systems your "open session" will continue as normal. Only when
you reboot your system, will the CMOS Checksums be recognized as "bad" &
the CMOS reset.