Exclamatory
Exclamatory
motherboard. It is responsible for initializing hardware components, such as the processor, memory, and
hard drives, when the computer is powered on. It also provides a basic set of low-level functions that
allow the operating system to communicate with the hardware.
Accessing the BIOS : it allows you to configure various settings, such as boot order, CPU settings,
system time, and more. You can also perform tasks like updating the BIOS firmware or resetting the BIOS
to default settings if needed.
the BIOS can vary slightly depending on the computer manufacturer, model, and BIOS version. It’s
always recommended to consult the computer’s manual or the manufacturer’s website for specific
instructions related to your device.
Additionally, the availability of certain methods or shortcuts may depend on the specific BIOS
implementation and version. Some newer computers may use UEFI (Unified Extensible Firmware
Interface) instead of traditional BIOS, which can have different access methods and interfaces.
Diagram of bios
POST: Power-on Self-Test, POST does not rely on any specific operating system. Additionally, there
does not even need to be an OS installed on a hard drive for it to run because POST is handled by the
BIOS, not any installed software. If an OS is installed, POST runs before it can start up.
POST checks that basic system devices are present and working properly, like the keyboard, peripheral
devices, and other hardware elements like processors, storage devices, and memory.
The computer will continue to boot after POST, but only if POST is successful. If POST finds an issue, you
will get an error of some kind, and hopefully the error is clear enough to start the troubleshooting
process.
o Update BIOS
BIOS Security :
Cyberattacks have become increasingly sophisticated, and traditional safeguards are proving
to be ineffective in the face of these advanced attacks.
Without BIOS security, hackers can easily access and manipulate a computer's information,
gaining control over your system up to the highest level.
These data breaches are often very difficult to detect, even when using high-level scanning
and other protective measures.
There are three primary methods used to protect your BIOS: passwords, full-disk encryption,
and trusted platform modules
Irrespective of whether or not an operating system is installed, the BIOS functions outside of
the operating system environment.
Look for a message on the screen indicating the key to access BIOS, often displayed as
"Press [Key] to enter BIOS" or a similar message.
Press the designated key repeatedly as soon as the computer starts until the BIOS
setup utility appears.
Your computer will restart, and the Advanced Startup Options menu will appear.
Follow the path: Troubleshoot → Advanced options → UEFI Firmware Settings →
Restart.
Press the designated key immediately and repeatedly until the BIOS setup utility
appears.
In the location field, type "shutdown.exe /r /fw" (without quotes) and click "Next".
Double-clicking the shortcut will restart your computer and directly enter the BIOS.
In the Command Prompt, type "shutdown.exe /r /fw" (without quotes) and press
Enter.
Type "msconfig" and press Enter to open the System Configuration utility.
Under the "Boot options" section, check the "Safe boot" box and select "Minimal".
Click "Apply" and then click "OK".
BIOS :
1) MAIN:
2) ADVANCED:
3) POWER:
4) SECURITY:
5) BOOT:
6) EXIT: