Psion Teklogix Vehicle-Mount Computer 8590 Manuel D’Utilisation

Page de 212
Appendix E: BIOS
BIOS Security Features
E-26 8580/8590 Vehicle-Mount Computer User Manual
In order to make a BIOS recovery from a USB device (floppy, USB Stick) the BIOS 
file must be copied into the root directory of the storage device and renamed to 
AMIBOOT.ROM. Then boot from the device.
The BIOS issues a series of 4 beeps that indicate that the system BIOS ROM file has 
successfully been updated.
After that the system will automatically reset and reboot.
Important:
If the boot block of the BIOS is corrupted the recovery scenario as 
described here will not be possible. In this situation the unit needs 
to be sent in for repair.
E.11  BIOS Security Features
The BIOS provides both a supervisor and user password. If you use both passwords, 
the supervisor password must be set first. The system can be configured so that all 
users must enter a password every time the system boots or when setup is executed.
The two passwords activate two different levels of security. If you select password 
support you are prompted for a one to six character password. Type the password on 
the keyboard. The password does not appear on the screen when typed. 
The supervisor password (supervisor mode) gives unrestricted access to view and 
change all the setup options. The user password (user mode) gives restricted access 
to view and change setup options.
If only the supervisor password is set, pressing [ENTER] at the password prompt of 
the BIOS setup program allows the user restricted access to setup.
Setting the password check to ‘Always’ restricts who can boot the system. The 
password prompt will be displayed before the system attempts to load the operating 
system. If only the supervisor password is set, pressing [ENTER] at the password 
prompt allows the user to boot the system.
E.12  Hard Disk Security Features
Hard disk security uses the security mode feature commands defined in the ATA 
specification. This functionality allows users to protect data using drive-level 
passwords. The passwords are kept within the drive, so data is protected even if the 
drive is moved to another computer system.