From: Jeff on
<snip>
> On some older Toshiba models with a parallel port, there was a
> "dongle" that you plugged into the parallel port that would kill the
> password. I just checked a "secret" service manual that I have for this
> model and it says to use the parallel port dongle to remove lost
> passwords on this model.

Thanks Barry. I have now bought and received a parallel port dongle. Does
anyone know if there's anything special that needs to be done? Just plug it
in and start the machine? Am I looking for any kind of message or amount of
time before I reboot without the dongle unattached?

Thanks in advance for any help.


From: Jeff on
<snip>
> I have not used it in a while, but I think you just plug it in (with the
> machine off), then turn on the machine, let it complete POST, turn it
> off and remove the dongle.

Well, since your "secret" service manual says to use the parallel port
dongle to remove lost passwords on this model, I think I'll try that first
and hope for the best. The machine is worthless as is, so there's not much
to lose...


From: BillW50 on
In news:heif6n$1r9$1(a)news.eternal-september.org,
Barry Watzman typed on Wed, 25 Nov 2009 00:26:31 -0500:
> .... Of course, no unit has had a floppy since about 2003 (I have
> no idea if that diskette will work with a USB drive on any later
> models).

I have researched this and I can't find any problems with USB floppies.
As long as the BIOS supports booting from an USB floppy drive that is.
Even BIOS flashing works. If anybody learns differently I would sure
love to hear about it.

--
Bill
Gateway MX6124 ('06 era) - Windows XP SP2


From: ~misfit~ on
Somewhere on teh intarwebs Barry Watzman wrote:
> The ability of some Toshiba laptops to bypass the BIOS password using
> a special floppy disk was so unique, that I don't think you can draw
> any conclusions about whether this is supported on non-floppy laptops
> models from .... anything.

I removed the BIOS password on a Tosh Sat A100 (no parallel port) recently
by lifting the keyboard (but leaving it attached), unseating the WAN card
underneath the keyboard thus exposing the two naked lands that are under
there on the mobo.

The trick is to short the lands ('jumper' them) while turning the machine
on. I used a screwdriver. As soon as you see the Toshiba splash screen you
can remove the short and power down. Next time you boot the password has
been removed.

I hope that this info doesn't get used by theives....
--
Shaun.

"Give a man a fire and he's warm for the day. But set fire to him and he's
warm for the rest of his life." Terry Pratchet, 'Jingo'.


From: ~misfit~ on
Somewhere on teh intarwebs Barry Watzman wrote:
> All laptops, as far as I know, have a set of pads that can be shorted
> to remove the password. However, the locations vary by model and are
> supposed to be "secret", but some of them leak.
>
> The Toshiba A100/A105 series is an interesting situation, because that
> "series" consisted of hundreds of models that really bore almost
> nothing in common. They don't even all use the same power supply
> voltage.

Yeah, I know. I did specify 'Sat' and 'A100' which was short for Satellite
A100. FYI the one I just did was a model PSAA9A. Some other models in the
series have the pads under the stuck-down black plastic mobo protecting film
under the right-hand side RAM slot....

I could keep going but, as you say it's supposed to be secret and those two
locations cover a lot of the laptops in the series...

"All laptops" have the pads? Now that I didn't know.
--
Shaun.

"Give a man a fire and he's warm for the day. But set fire to him and he's
warm for the rest of his life." Terry Pratchet, 'Jingo'.

> ~misfit~ wrote:
>> Somewhere on teh intarwebs Barry Watzman wrote:
>>> The ability of some Toshiba laptops to bypass the BIOS password
>>> using a special floppy disk was so unique, that I don't think you
>>> can draw any conclusions about whether this is supported on
>>> non-floppy laptops models from .... anything.
>>
>> I removed the BIOS password on a Tosh Sat A100 (no parallel port)
>> recently by lifting the keyboard (but leaving it attached),
>> unseating the WAN card underneath the keyboard thus exposing the two
>> naked lands that are under there on the mobo.
>>
>> The trick is to short the lands ('jumper' them) while turning the
>> machine on. I used a screwdriver. As soon as you see the Toshiba
>> splash screen you can remove the short and power down. Next time you
>> boot the password has been removed.
>>
>> I hope that this info doesn't get used by theives....