Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
CyLab's Angle on Sustainable Computing and Trustwo...
 
C# Moves Head in Statistical Leapfrog
 
Open Authentication: One-Time Passwords and Crypto...
 
Is Faith in Innovation Wearing Thin?
 
Repairing Aberrant Behavior: But Is That the Threa...
 
Standards as Arbitrary Solutions to Recurring Prob...
 
Easy trouble-free use of IT tops the list
 
Maturing UML and Increasing Expressiveness
 
More Open Than Open
 
Removing Complexity Makes Less Better

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-04-07

 

All Your BIOS Are Still Mine

ACM News Service: Call of the Wild for BIOS.  I always relish an opportunity to be mildly prophetic.  The Free Software Foundation is calling for an open-source BIOS that cracks the thicket of proprietary, non-disclosed, and trade-secret agreements around the PC BIOS and the different components that can be configured to operate with it (and vice versa). John G. Spooner's 2005-04-05 CNet News.com article covers the points of the debate and the current tightly-held, secretive efforts to prevent reverse engineering and counter electronics piracy as well as unwanted competition.  Although the secrecy-through-obscurity principle is also used as an argument that the current state protects users, that makes no sense.  As far as I can tell, hackers are fully aware of BIOS vulnerabilities. Stay tuned.  This arcane conflict is not likely to turn in open-source's favor.
I am presently in possession of a BIOS, in my Averatec C3500, of unknown lineage and scary behavior.  Actually, this is also the first time I obtained Windows XP Pro as an OEM installation and I'm not thrilled about that either, especially since this OEM doesn't provide clean-install Windows disks and some of the defaults somebody chose for me are really scary.  The scary part of this BIOS is that computer glitches will drive it back to the default setup, the most scarily-insecure frailty I've seen.  It looks easy to induce too, though I don't go looking for trouble.  The reversion to default drops every safeguard I put in place: setup access password, boot password, boot from hard drive first, perform full POST, and drop the OEM wallpaper so I can see the progression of the startup sequence (and have the option to launch recovery console once I learn how to install it on XP SP2.  To name a few precautions.  Heh. I can't figure out how to kill the LAN card though, since it insists on enabling boot-on-LAN and staying active when I shut down the machine what I thought was completely.  But no, the lights on my hub stay solid on for the that is connected to li'l Blocco.  So I make sure the powered-down machine has the lid closed and the LAN connector unplugged.  But, you know, I just don't trust the machine to stay protected, and I haven't even listed my software safeguards.  If the BIOS is vulnerable, practically all other bets are off and the obscurity of the BIOS implementation is not a source of reassurance [;<).

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $