bios update procedure

Upload: happy2009y

Post on 06-Apr-2018

251 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 BIOS Update Procedure

    1/28

    BIOS Update Procedure

    All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades areeasily obtained by incorporating the system BIOS in a FLASH Memory component. With

    FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the

    upgrade utility fits on a floppy disc allowing the user to save, verify and update the systemBIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities.

    However, memory managers can not be installed while upgrading.

    Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions

    therefore do not apply to these boards. If your motherboard does not have a Flash BIOS

    (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip.

    See your dealer for more information about this.

    Please read the following instructions in full before starting a Flash BIOS upgrade:

    A. Create a Bootable Floppy (in DOS)

    With a non-formatted disk, type the following:

    format a:/s

    If using a formatted disk, type:

    sys a:

    This procedure will ensure a clean boot when you are flashing the new BIOS.

    B. Download the BIOS file

    Download the correct BIOS file by clicking on the file name of the BIOS file you wish to

    download.

    Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the

    BIOS file and the flash utility file. If you don't have an "unzip" utility, download the

    WinZip for Windows 95 shareware/ evaluation copy for that one time use from

    _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines,have a shareware version of WinZip on them.

    You should have extracted two files:

    Flash BIOS utility eg: flash7265.exe (for example)

    BIOS eg: 6152J900.bin (example)

    Use the latest flash utility available unless otherwise specified (either on the BIOS update

    page or in the archive file). This information is usually provided.

  • 8/2/2019 BIOS Update Procedure

    2/28

    C. Upgrade the System BIOS

    During boot up, write down the old BIOS version because you will need to use it for the

    BIOS backup file name.

    Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and

    reboot the system in MS-DOS, preferably Version 6.22

    At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its

    extension.

    For example:

    flash625 615j900.bin

    From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if youwant to save (back up) your current BIOS (strongly recommended), then type the name of

    your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

    Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that

    you won't be able to recover from a possible failure.

    Select "Y" to "Are you sure to program?"

    Wait until it displays "Message: Power Off or Reset the system"

    Once the BIOS has been successfully loaded, remove the floppy disk and reboot the

    system. If you write to BIOS but cannot complete the procedure, do not switch off, becausethe computer will not be able to boo, and you will not be given another chance to flash. In

    this case leave your system on until you resolve the problem (flashing BIOS with old file is

    a possible solution, provided you've made a backup before)

    Make sure the new BIOS version has been loaded properly by taking note of the BIOS

    identifier as the system is rebooting.

    For AMI BIOS

    Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system

    holding the "END" key prior to power on until you enter CMOS setup. If you do not do thisthe first time booting up after upgrading the BIOS, the system will hang.

    BIOS Update Tipsnote:

    1.Make sure never to turn off or reset your computer during the flash process. This will

    corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on

    the bootable floppy so you can reflash it if you need to. (This option is not available when

  • 8/2/2019 BIOS Update Procedure

    3/28

    flashing an AMI BIOS).

    2. If you have problems installing your new BIOS please check the following:

    Have you done a clean boot?

    In other words, did you follow the above procedure for making a bootable floppy? Thisensures that when booting from "A" there are no device drivers on the diskette. Failing to

    do a clean boot is the most common cause for getting a "Memory Insufficient" error

    message when attempting to flash a BIOS.

    If you have not used a bootable floppy, insure a clean boot either by

    a) pressing F5 during bootup

    b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do

    this by using the EDIT command.

    Have you booted up under DOS?

    Booting in Windows is another common cause for getting a "Memory Insufficient" errormessage when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum

    set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in

    MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode inWindowsNT, but rather following the above procedure (format a: /s and rebooting from

    a:\).

    Have you entered the full file name of the flash utility and the BIOS plus its extension?Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS.

    Example: when asked for file name of new BIOS file which is on your floppy disk, in case

    you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.______________________________

    Getting used to using your keyboard exclusively and leaving your mouse behind will make

    you much more efficient at performing any task on any Windows system. I use thefollowing keyboard shortcuts every day:

    Windows key + R = Run menu

    This is usually followed by:

    cmd = Command Prompt

    iexplore + "web address" = Internet Explorercompmgmt.msc = Computer Management

    dhcpmgmt.msc = DHCP Management

    dnsmgmt.msc = DNS Managementservices.msc = Services

    eventvwr = Event Viewer

    dsa.msc = Active Directory Users and Computers

    dssite.msc = Active Directory Sites and Services

  • 8/2/2019 BIOS Update Procedure

    4/28

    Windows key + E = Explorer

    ALT + Tab = Switch between windows

    ALT, Space, X = Maximize window

    CTRL + Shift + Esc = Task Manager

    Windows key + Break = System properties

    Windows key + F = Search

    Windows key + D = Hide/Display all windows

    CTRL + C = copy

    CTRL + X = cut

    CTRL + V = paste

    Also don't forget about the "Right-click" key next to the right Windows key on your

    keyboard. Using the arrows and that key can get just about anything done once you'veopened up any program.

    Keyboard Shortcuts

    [Alt] and [Esc] Switch between running applications

    [Alt] and letter Select menu item by underlined letter

    [Ctrl] and [Esc] Open Program Menu

    [Ctrl] and [F4] Close active document or group windows (does not work with some

    applications)

    [Alt] and [F4] Quit active application or close current window

    [Alt] and [-] Open Control menu for active document

    Ctrl] Lft., Rt. arrow Move cursor forward or back one word

    Ctrl] Up, Down arrow Move cursor forward or back one paragraph

    [F1] Open Help for active application

  • 8/2/2019 BIOS Update Procedure

    5/28

    Windows+M Minimize all open windows

    Shift+Windows+M Undo minimize all open windows

    Windows+F1 Open Windows Help

    Windows+Tab Cycle through the Taskbar buttons

    Windows+Break Open the System Properties dialog box

    acessability shortcuts

    Right SHIFT for eight seconds........ Switch FilterKeys on and off.

    Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

    Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

    SHIFT....... five times Switch StickyKeys on and off.

    NUM LOCK...... for five seconds Switch ToggleKeys on and off.

    explorer shortcuts

    END....... Display the bottom of the active window.

    HOME....... Display the top of the active window.

    NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the

    selected folder.

    NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected

    folder.

    NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

    LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

    RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.

    Type the following commands in your Run Box (Windows Key + R) or Start Run

  • 8/2/2019 BIOS Update Procedure

    6/28

    devmgmt.msc = Device Manager

    msinfo32 = System Informationcleanmgr = Disk Cleanup

    ntbackup = Backup or Restore Wizard (Windows Backup Utility)

    mmc = Microsoft Management Consoleexcel = Microsoft Excel (If Installed)

    msaccess = Microsoft Access (If Installed)

    powerpnt = Microsoft PowerPoint (If Installed)winword = Microsoft Word (If Installed)

    frontpg = Microsoft FrontPage (If Installed)

    notepad = Notepad

    wordpad = WordPadcalc = Calculator

    msmsgs = Windows Messenger

    mspaint = Microsoft Paint

    wmplayer = Windows Media Playerrstrui = System Restore

    netscp6 = Netscape 6.xnetscp = Netscape 7.x

    netscape = Netscape 4.x

    waol = America Onlinecontrol = Opens the Control Panel

    control printers = Opens the Printers Dialog

    internetbrowser

    type in u're adress "google", then press [Right CTRL] and [Enter]add www. and .com to word and go to it

    For Windows XP:

    Copy. CTRL+C

    Cut. CTRL+XPaste. CTRL+V

    Undo. CTRL+Z

    Delete. DELETEDelete selected item permanently without placing the item in the Recycle Bin.

    SHIFT+DELETE

    Copy selected item. CTRL while dragging an itemCreate shortcut to selected item. CTRL+SHIFT while dragging an item

    Rename selected item. F2

    Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW

    Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW

  • 8/2/2019 BIOS Update Procedure

    7/28

    Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW

    Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW

    Highlight a block of text. CTRL+SHIFT with any of the arrow keysSelect more than one item in a window or on the desktop, or select text within a document.

    SHIFT with any of the arrow keys

    Select all. CTRL+ASearch for a file or folder. F3

    View properties for the selected item. ALT+ENTER

    Close the active item, or quit the active program. ALT+F4Opens the shortcut menu for the active window. ALT+SPACEBAR

    Close the active document in programs that allow you to have multiple documents open

    simultaneously. CTRL+F4

    Switch between open items. ALT+TABCycle through items in the order they were opened. ALT+ESC

    Cycle through screen elements in a window or on the desktop. F6

    Display the Address bar list in My Computer or Windows Explorer. F4

    Display the shortcut menu for the selected item. SHIFT+F10Display the System menu for the active window. ALT+SPACEBAR

    Display the Start menu. CTRL+ESCDisplay the corresponding menu. ALT+Underlined letter in a menu name

    Carry out the corresponding command. Underlined letter in a command name on an open

    menuActivate the menu bar in the active program. F10

    Open the next menu to the right, or open a submenu. RIGHT ARROW

    Open the next menu to the left, or close a submenu. LEFT ARROW

    Refresh the active window. F5View the folder one level up in My Computer or Windows Explorer. BACKSPACE

    Cancel the current task. ESC

    SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automaticallyplaying.

    Use these keyboard shortcuts for dialog boxes:

    To Press

    Move forward through tabs. CTRL+TAB

    Move backward through tabs. CTRL+SHIFT+TABMove forward through options. TAB

    Move backward through options. SHIFT+TAB

    Carry out the corresponding command or select the corresponding option.ALT+Underlined letter

    Carry out the command for the active option or button. ENTER

    Select or clear the check box if the active option is a check box. SPACEBARSelect a button if the active option is a group of option buttons. Arrow keys

    Display Help. F1

    Display the items in the active list. F4

    Open a folder one level up if a folder is selected in the Save As or Open dialog box.

  • 8/2/2019 BIOS Update Procedure

    8/28

    BACKSPACE

    If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includesthe Windows logo key and the Application key , you can use these keyboard shortcuts:

    Display or hide the Start menu. WIN Key

    Display the System Properties dialog box. WIN Key+BREAK

    Show the desktop. WIN Key+DMinimize all windows. WIN Key+M

    Restores minimized windows. WIN Key+Shift+M

    Open My Computer. WIN Key+E

    Search for a file or folder. WIN Key+FSearch for computers. CTRL+WIN Key+F

    Display Windows Help. WIN Key+F1

    Lock your computer if you are connected to a network domain, or switch users if you are

    not connected to a network domain. WIN Key+ LOpen the Run dialog box. WIN Key+R

    Open Utility Manager. WIN Key+U

    accessibility keyboard shortcuts:

    Switch FilterKeys on and off. Right SHIFT for eight seconds

    Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN

    Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK

    Switch StickyKeys on and off. SHIFT five timesSwitch ToggleKeys on and off. NUM LOCK for five seconds

    Open Utility Manager. WIN Key+U

    shortcuts you can use with Windows Explorer:

    Display the bottom of the active window. END

    Display the top of the active window. HOME

    Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric

    keypad (*)Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad

    (+)

    Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)Collapse current selection if it's expanded, or select parent folder. LEFT ARROW

    Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW

  • 8/2/2019 BIOS Update Procedure

    9/28

    ADSL - Asymmetric Digital Subscriber Line

    AGP - Accelerated Graphics Port

    ALI - Acer Labs, IncorporatedALU - Arithmetic Logic Unit

    AMD - Advanced Micro Devices

    APC - American Power ConversionASCII - American Standard Code for Information Interchange

    ASIC - Application Specific Integrated Circuit

    ASPI - Advanced SCSI Programming InterfaceAT - Advanced Technology

    ATI - ATI Technologies Inc.

    ATX - Advanced Technology Extended

    --- B ---

    BFG - BFG Technologies

    BIOS - Basic Input Output System

    BNC - Barrel Nut Connector

    --- C ---CAS - Column Address Signal

    CD - Compact Disk

    CDR - Compact Disk RecorderCDRW - Compact Disk Re-Writer

    CD-ROM - Compact Disk - Read Only Memory

    CFM - Cubic Feet per Minute (ft?/min)

    CMOS - Complementary Metal Oxide SemiconductorCPU - Central Processing Unit

    CTX - CTX Technology Corporation (Commited to Excellence)

    --- D ---

    DDR - Double Data Rate

    DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access MemoryDFI - DFI Inc. (Design for Innovation)

    DIMM - Dual Inline Memory Module

    DRAM - Dynamic Random Access MemoryDPI - Dots Per Inch

    DSL - See ASDL

    DVD - Digital Versatile Disc

    DVD-RAM - Digital Versatile Disk - Random Access Memory

    --- E ---

    ECC - Error Correction CodeECS - Elitegroup Computer Systems

    EDO - Extended Data Out

    EEPROM - Electrically Erasable Programmable Read-Only Memory

  • 8/2/2019 BIOS Update Procedure

    10/28

    EPROM - Erasable Programmable Read-Only Memory

    EVGA - EVGA Corporation

    --- F ---

    FC-PGA - Flip Chip Pin Grid Array

    FDC - Floppy Disk ControllerFDD - Floppy Disk Drive

    FPS - Frame Per Second

    FPU - Floating Point UnitFSAA - Full Screen Anti-Aliasing

    FS - For Sale

    FSB - Front Side Bus

    --- G ---

    GB - Gigabytes

    GBps - Gigabytes per second or Gigabits per second

    GDI - Graphical Device InterfaceGHz - GigaHertz

    --- H ---

    HDD - Hard Disk Drive

    HIS - Hightech Information System LimitedHP - Hewlett-Packard Development Company

    HSF - Heatsink-Fan

    --- I ---IBM - International Business Machines Corporation

    IC - Integrated Circuit

    IDE - Integrated Drive ElectronicsIFS- Item for Sale

    IRQ - Interrupt Request

    ISA - Industry Standard ArchitectureISO - International Standards Organization

    --- J ---

    JBL - JBL (Jame B. Lansing) SpeakersJVC - JVC Company of America

    - K ---Kbps - Kilobits Per Second

    KBps - KiloBytes per second

    --- L ---

    LG - LG Electronics

    LAN - Local Area Network

    LCD - Liquid Crystal Display

  • 8/2/2019 BIOS Update Procedure

    11/28

    LDT - Lightning Data Transport

    LED - Light Emitting Diode

    --- M ---

    MAC - Media Access Control

    MB?

    MotherBoard or MegabyteMBps - Megabytes Per SecondMbps - Megabits Per Second or Megabits Per Second

    MHz - MegaHertz

    MIPS - Million Instructions Per SecondMMX - Multi-Media Extensions

    MSI - Micro Star International

    --- N ---

    NAS - Network Attached Storage

    NAT - Network Address Translation

    NEC - NEC CorporationNIC - Network Interface Card

    --- O ---OC - Overclock (Over Clock)

    OCZ - OCZ Technology

    OEM - Original Equipment Manufacturer

    --- P ---

    PC - Personal ComputerPCB - Printed Circuit Board

    PCI - Peripheral Component InterconnectPDA - Personal Digital Assistant

    PCMCIA - Peripheral Component Microchannel Interconnect ArchitecturePGA - Professional Graphics Array

    PLD - Programmable Logic Device

    PM - Private Message / Private MessagingPnP - Plug 'n Play

    PNY - PNY Technology

    POST - Power On Self TestPPPoA - Point-to-Point Protocol over ATM

    PPPoE - Point-to-Point Protocol over Ethernet

    PQI - PQI Corporation

    PSU - Power Supply Unit

    --- R ---

    RAID - Redundant Array of Inexpensive DisksRAM - Random Access Memory

    RAMDAC - Random Access Memory Digital Analog Convertor

    RDRAM - Rambus Dynamic Random Access Memory

  • 8/2/2019 BIOS Update Procedure

    12/28

    ROM - Read Only Memory

    RPM - Revolutions Per Minute

    --- S ---

    SASID - Self-scanned Amorphous Silicon Integrated Display

    SCA - SCSI Configured AutomaticallySCSI - Small Computer System Interface

    SDRAM - Synchronous Dynamic Random Access Memory

    SECC - Single Edge Contact ConnectorSODIMM - Small Outline Dual Inline Memory Module

    SPARC - Scalable Processor ArChitecture

    SOHO - Small Office Home Office

    SRAM - Static Random Access MemorySSE - Streaming SIMD Extensions

    SVGA - Super Video Graphics Array

    S/PDIF - Sony/Philips Digital Interface

    --- T ---

    TB - TerabytesTBps - Terabytes per second

    Tbps - Terabits per second

    TDK - TDK ElectronicsTEC - Thermoelectric Cooler

    TPC - TipidPC

    TWAIN - Technology Without An Important Name

    --- U ---

    UART - Universal Asynchronous Receiver/Transmitter

    USB - Universal Serial BusUTP - Unshieled Twisted Pair

    --- V ---VCD - Video CD

    VPN - Virtual Private Network

    --- W ---WAN - Wide Area Network

    WTB - Want to Buy

    WYSIWYG - What You See Is What You Get

    --- X ---

    XGA - Extended Graphics ArrayXFX - XFX Graphics, a Division of Pine

    XMS - Extended Memory Specification

    XT - Extended Technology

  • 8/2/2019 BIOS Update Procedure

    13/28

    Create A Huge File

    You can create a file of any size using nothing more than what's supplied with Windows.Start by converting the desired file size into hexadecimal notation. You can use the

    Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million

    bytes. Enter 1000000 in the calculator and click on the Hex option to convert it (1 millionin hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digits

    000F4240.

    Now open a command prompt window. In Windows 95, 98, or Me, you can do this byentering COMMAND in the Start menu's Run dialog; in Windows NT 4.0, 2000, or XP

    enter CMD instead. Enter the command DEBUG BIGFILE.DAT and ignore the File not

    found message. Type RCX and press Enter. Debug will display a colon prompt. Enter the

    last four digits of the hexadecimal number you calculated (4240, in our example). TypeRBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our

    example). Enter W for Write and Q for Quit. You've just created a 1-million-byte file usingDebug. Of course you can create a file of any desired size using the same technique.

    ______________________________

    elete An "undeletable" File

    Open a Command Prompt window and leave it open.

    Close all open programs.

    Click Start, Run and enter TASKMGR.EXEGo to the Processes tab and End Process on Explorer.exe.

    Leave Task Manager open.

    Go back to the Command Prompt window and change to the directory the AVI (or otherundeletable file) is located in.

    At the command prompt type DEL where is the file you wish to

    delete.Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart the

    GUI shell.

    Close Task Manager.

    Or you can try this

    Open Notepad.exe

    Click File>Save As..>

    locate the folder where ur undeletable file is

    Choose 'All files' from the file type box

  • 8/2/2019 BIOS Update Procedure

    14/28

    click once on the file u wanna delete so its name appears in the 'filename' box

    put a " at the start and end of the filename

    (the filename should have the extension of the undeletable file so it will overwrite it)

    click save,

    It should ask u to overwrite the existing file, choose yes and u can delete it as normal

    Here's a manual way of doing it. I'll take this off once you put into your first post zain.

    1. Start

    2. Run

    3. Type: command

    4. To move into a directory type: cd c:\*** (The stars stand for your folder)5. If you cannot access the folder because it has spaces for example Program Files or Kazaa

    Lite folder you have to do the following. instead of typing in the full folder name only takethe first 6 letters then put a ~ and then 1 without spaces. Example: cd c:\progra~1\kazaal~1

    6. Once your in the folder the non-deletable file it in type in dir - a list will come up with

    everything inside.7. Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name has

    spaces you would use the special 1st 6 letters followed by a ~ and a 1 rule. Example: if

    your file name was bad file.bmp you would type once in the specific folder thorugh

    command, del badfil~1.bmp and your file should be gone. Make sure to type in the correctextension.

    part 1

    Like any other field in computer science, viruses have evolved -a great deal indeed- over

    the years. In the series of press releases which start today, we will look at the origins andevolution of malicious code since it first appeared up to the present.

    Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann

    described self-replicating programs which could resemble computer viruses as they areknown today. However, it was not until the 60s that we find the predecessor of current

    viruses. In that decade, a group of programmers developed a game called Core Wars,

    which could reproduce every time it was run, and even saturate the memory of otherplayers computers. The creators of this peculiar game also created the first antivirus, an

    application named Reeper, which could destroy copies created by Core Wars.

    However, it was only in 1983 that one of these programmers announced the existence of

    Core Wars, which was described the following year in a prestigious scientific magazine:

    this was actually the starting point of what we call computer viruses today.

  • 8/2/2019 BIOS Update Procedure

    15/28

    At that time, a still young MS-DOS was starting to become the preeminent operating

    system worldwide. This was a system with great prospects, but still many deficiencies as

    well, which arose from software developments and the lack of many hardware elementsknown today. Even like this, this new operating system became the target of a virus in

    1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so

    that their contents could not be accessed. That year also saw the birth of the first Trojan: anapplication called PC-Write.

    Shortly after, virus writers realized that infecting files could be even more harmful tosystems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened

    the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to

    come: 1988 set the date when the Morris worm appeared, infecting 6,000 computers.

    From that date up to 1995 the types of malicious codes that are known today started being

    developed: the first macro viruses appeared, polymorphic viruses Some of these even

    triggered epidemics, such as MichaelAngelo. However, there was an event that changed the

    virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, virusesstarted adapting to this new situation until the appearance, in 1999, of Melissa, the first

    malicious code to cause a worldwide epidemic, opening a new era for computer viruses.

    part 2

    This second installment of The evolution of viruses will look at how malicious code usedto spread before use of the Internet and e-mail became as commonplace as it is today, and

    the main objectives of the creators of those earlier viruses.

    Until the worldwide web and e-mail were adopted as a standard means of communicationthe world over, the main mediums through which viruses spread were floppy disks,

    removable drives, CDs, etc., containing files that were already infected or with the virus

    code in an executable boot sector.

    When a virus entered a system it could go memory resident, infecting other files as they

    were opened, or it could start to reproduce immediately, also infecting other files on the

    system. The virus code could also be triggered by a certain event, for example when thesystem clock reached a certain date or time. In this case, the virus creator would calculate

    the time necessary for the virus to spread and then set a date often with some particular

    significance- for the virus to activate. In this way, the virus would have an incubationperiod during which it didnt visibly affect computers, but just spread from one system to

    another waiting for D-day to launch its payload. This incubation period would be vital to

    the virus successfully infecting as many computers as possible.

    One classic example of a destructive virus that lay low before releasing its payload was

    CIH, also known as Chernobyl. The most damaging version of this malicious code

    activated on April 26, when it would try to overwrite the flash-BIOS, the memory which

  • 8/2/2019 BIOS Update Procedure

    16/28

    includes the code needed to control PC devices. This virus, which first appeared in June

    1998, had a serious impact for over two years and still continues to infect computers today.

    Because of the way in which they propagate, these viruses spread very slowly, especially in

    comparison to the speed of todays malicious code. Towards the end of the Eighties, for

    example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread andcontinued to infect computers for some years. In contrast, experts reckon that in January

    2003, SQLSlammer took just ten minutes to cause global communication problems across

    the Internet.

    Notoriety versus stealth

    For the most part, in the past, the activation of a malicious code triggered a series of onscreen messages or images, or caused sounds to be emitted to catch the users attention.

    Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side

    of the screen to another. This kind of elaborate display was used by the creator of the virus

    to gain as much notoriety as possible. Nowadays however, the opposite is the norm, withvirus authors trying to make malicious code as discreet as possible, infecting users systems

    without them noticing that anything is amiss.

    pat 3

    This third installment of The evolution of viruses will look at how the Internet and e-mailchanged the propagation techniques used by computer viruses.

    Internet and e-mail revolutionized communications. However, as expected, virus creatorsdidnt take long to realize that along with this new means of communication, an excellent

    way of spreading their creations far and wide had also dawned. Therefore, they quickly

    changed their aim from infecting a few computers while drawing as much attention tothemselves as possible, to damaging as many computers as possible, as quickly as possible.

    This change in strategy resulted in the first global virus epidemic, which was caused by the

    Melissa worm.

    With the appearance of Melissa, the economic impact of a virus started to become an issue.

    As a result, users -above all companies- started to become seriously concerned about the

    consequences of viruses on the security of their computers. This is how users discoveredantivirus programs, which started to be installed widely. However, this also brought about a

    new challenge for virus writers, how to slip past this protection and how to persuade users

    to run infected files.

    The answer to which of these virus strategies was the most effective came in the form of a

    new worm: Love Letter, which used a simple but effective ruse that could be considered an

    early type of social engineering. This strategy involves inserting false messages that trick

  • 8/2/2019 BIOS Update Procedure

    17/28

    users into thinking that the message includes anything, except a virus. This worms bait

    was simple; it led users to believe that they had received a love letter.

    This technique is still the most widely used. However, it is closely followed by another

    tactic that has been the center of attention lately: exploiting vulnerabilities in commonly

    used software. This strategy offers a range of possibilities depending on the security holeexploited. The first malicious code to use this method and quite successfully- were the

    BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet

    Explorer by inserting HTML code in the body of the e-mail message, which allowed themto run automatically, without needing the user to do a thing.

    Vulnerabilities allow many different types of actions to be carried out. For example, they

    allow viruses to be dropped on computers directly from the Internet -such as the Blasterworm-. In fact, the effects of the virus depend on the vulnerability that the virus author tries

    to exploit.

    part 4

    In the early days of computers, there were relatively few PCs likely to contain sensitiveinformation, such as credit card numbers or other financial data, and these were generally

    limited to large companies that had already incorporated computers into working processes.

    In any event, information stored in computers was not likely to be compromised, unless thecomputer was connected to a network through which the information could be transmitted.

    Of course, there were exceptions to this and there were cases in which hackers perpetrated

    frauds using data stored in IT systems. However, this was achieved through typical hackingactivities, with no viruses involved.

    The advent of the Internet however caused virus creators to change their objectives, and,from that moment on, they tried to infect as many computers as possible in the shortest

    time. Also, the introduction of Internet services -like e-banking or online shopping- brought

    in another change. Some virus creators started writing malicious codes not to infect

    computers, but, to steal confidential data associated to those services. Evidently, to achievethis, they needed viruses that could infect many computers silently.

    Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed ofmalicious code generically called Trojan Horse, or simply Trojan. This first Trojan

    was called PC-Write and tried to pass itself off as the shareware version of a text processor.

    When run, the Trojan displayed a functional text processor on screen. The problem wasthat, while the user wrote, PC-Write deleted and corrupted files on the computers hard

    disk.

    After PC-Write, this type of malicious code evolved very quickly to reach the stage of

  • 8/2/2019 BIOS Update Procedure

    18/28

    present-day Trojans. Today, many of the people who design Trojans to steal data cannot be

    considered virus writers but simply thieves who, instead of using blowtorches or dynamite

    have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger familiesof Trojans are examples of this

    part 5

    Even though none of them can be left aside, some particular fields of computer science

    have played a more determinant role than others with regard to the evolution of viruses.

    One of the most influential fields has been the development of programming languages.

    These languages are basically a means of communication with computers in order to tell

    them what to do. Even though each of them has its own specific development and

    formulation rules, computers in fact understand only one language called "machine code".

    Programming languages act as an interpreter between the programmer and the computer.

    Obviously, the more directly you can communicate with the computer, the better it willunderstand you, and more complex actions you can ask it to perform.

    According to this, programming languages can be divided into "low and high level"languages, depending on whether their syntax is more understandable for programmers or

    for computers. A "high level" language uses expressions that are easily understandable for

    most programmers, but not so much for computers. Visual Basic and C are good examples

    of this type of language.

    On the contrary, expressions used by "low level" languages are closer to machine code, but

    are very difficult to understand for someone who has not been involved in theprogramming process. One of the most powerful, most widely used examples of this type

    of language is "assembler".

    In order to explain the use of programming languages through virus history, it is necessary

    to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor

    does not have the power of modern 64-bit processors, and this of course, has had an impact

    on the programming languages used.

    In this and the next installments of this series, we will look at the different programming

    languages used by virus creators through computer history:

    - Virus antecessors: Core Wars

    As was already explained in the first chapter of this series, a group of programs called Core

    Wars, developed by engineers at an important telecommunications company, are

    considered the antecessors of current-day viruses. Computer science was still in the early

    stages and programming languages had hardly developed. For this reason, authors of these

  • 8/2/2019 BIOS Update Procedure

    19/28

    proto-viruses used a language that was almost equal to machine code to program them.

    Curiously enough, it seems that one of the Core Wars programmers was Robert ThomasMorris, whose son programmed -years later- the "Morris worm". This malicious code

    became extraordinarily famous since it managed to infect 6,000 computers, an impressive

    figure for 1988.

    - The new gurus of the 8-bits and the assembler language.

    The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in

    Europe, bring memories of times gone by, when a new generation of computer enthusiasts

    "fought" to establish their place in the programming world. To be the best, programmers

    needed to have profound knowledge of machine code and assembler, as interpreters ofhigh-level languages used too much run time. BASIC, for example, was a relatively easy to

    learn language which allowed users to develop programs simply and quickly. It had

    however, many limitations.

    This caused the appearance of two groups of programmers: those who used assembler and

    those who turned to high-level languages (BASIC and PASCAL, mainly).

    Computer aficionados of the time enjoyed themselves more by programming useful

    software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was "Elk Cloner", and was programmed in machine code. This virus

    could infect Apple II systems and displayed a message when it infected a computer.

    part 6

    Computer viruses evolve in much the same way as in other areas of IT. Two of the most

    important factors in understanding how viruses have reached their current level are thedevelopment of programming languages and the appearance of increasingly powerful

    hardware.

    In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made itsappearance, a new operating system was growing in popularity. Its full name was

    Microsoft Disk Operating System, although computer buffs throughout the world would

    soon refer to it simply as DOS.

    DOS viruses

    The development of MS DOS systems occurred in parallel to the appearance of new, more

    powerful hardware. Personal computers were gradually establishing themselves as tools

    that people could use in their everyday lives, and the result was that the number of PCs

    users grew substantially. Perhaps inevitably, more users also started creating viruses.

  • 8/2/2019 BIOS Update Procedure

    20/28

    Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in

    assembler language and demonstrating a degree of skill on the part of their authors.

    Far less programmers know assembler language than are familiar with high-level languages

    that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal

    soon began to appear. The last two languages, which are well established and verypowerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions.

    This ultimately led to the appearance of virus families: that is, viruses that are followed

    by a vast number of related viruses which are slightly modified forms of the original code.

    Other users took the less artistic approach of creating destructive viruses that did not

    require any great knowledge of programming. As a result, batch processing file viruses or

    BAT viruses began to appear.

    Win16 viruses

    The development of 16-bit processors led to a new era in computing. The first consequencewas the birth of Windows, which, at the time, was just an application to make it easier to

    handle DOS using a graphic interface.

    The structure of Windows 3.xx files is rather difficult to understand, and the assembler

    language code is very complicated, as a result of which few programmers initiallyattempted to develop viruses for this platform. But this problem was soon solved thanks to

    the development of programming tools for high-level languages, above all Visual Basic.

    This application is so effective that many virus creators adopted it as their daily working

    tool. This meant that writing a virus had become a very straightforward task, and virusessoon appeared in their hundreds. This development was accompanied by the appearance of

    the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL

    Trojan family -designed to steal personal information from infected computers- wereidentified.

    part 7

    This seventh edition on the history of computer viruses will look at how the development

    of Windows and Visual Basic has influenced the evolution of viruses, as with the

    development of these, worldwide epidemics also evolved such as the first one caused byMelissa in 1999.

    While Windows changed from being an application designed to make DOS easier tomanage to a 32-bit platform and operating system in its own right, virus creators went back

    to using assembler as the main language for programming viruses.

    Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along

    with Borland Delphi (the Pascal development for the Windows environment), for Trojan

    and worm writers. Then, Visual C, a powerful environment developed in C for Windows,

    was adopted for creating viruses, Trojans and worms. This last type of malware gained

  • 8/2/2019 BIOS Update Procedure

    21/28

    unusual strength, taking over almost all other types of viruses. Even though the

    characteristics of worms have changed over time, they all have the same objective: to

    spread to as many computers as possible, as quickly as possible.

    With time, Visual Basic became extremely popular and Microsoft implemented part of the

    functionality of this language as an interpreter capable of running script files with a similarsyntax.

    At the same time as the Win32 platform was implemented, the first script viruses alsoappeared: malware inside a simple text file. These demonstrated that not only executable

    files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there

    are also other means of propagation, proving the saying "anything that can be executed

    directly or through a interpreter can contain malware." To be specific, the first viruses thatinfected the macros included in Microsoft Office emerged. As a result, Word, Excel,

    Access and PowerPoint become ways of spreading lethal weapons, which destroyed

    information when the user simply opened a document.

    Melissa and self-executing worms

    The powerful script interpreters in Microsoft Office allowed virus authors to arm their

    creations with the characteristics of worms. A clear example is Melissa, a Word macro

    virus with the characteristics of a worm that infects Word 97 and 2000 documents. Thisworm automatically sends itself out as an attachment to an e-mail message to the first 50

    contacts in the Outlook address book on the affected computer. This technique, which has

    unfortunately become very popular nowadays, was first used in this virus which, in 1999,

    caused one of the largest epidemics in computer history in just a few days. In fact,companies like Microsoft, Intel or Lucent Technologies had to block their connections to

    the Internet due to the actions of Melissa.

    The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink,

    which unlike its predecessor sent itself out to all the contacts in the address book on the

    infected PC. This started a new wave of worms capable of sending themselves out to all thecontacts in the Outlook address book on the infected computer. Of these, the worm that

    most stands out from the rest is VBS/LoveLetter, more commonly known as I love You,

    which emerged in May 2000 and caused an epidemic that caused damage estimated at

    10,000 million euros. In order to get the users attention and help it to spread, this wormsent itself out in an e-mail message with the subject ILOVEYOU and an attached file

    called LOVE-LETTER-FOR-YOU.TXT.VBS. When the user opened this attachment, the

    computer was infected.

    As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in

    virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internetworm written in VB Script. VBS/BubbleBoy was automatically run without the user

    needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to

    automatically run when the message was opened or viewed. This worm was followed in

    2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in

  • 8/2/2019 BIOS Update Procedure

    22/28

    Microsoft Outlook Express, allowing it to infect computers without the user needing to run

    an attached file. These were the first samples of a series of worms, which were joined later

    on by worms capable of attacking computers when the user is browsing the Internet.

    Google secrets

    --------------------------------------------------------------------------------

    method 1?ww.google.com

    put this string in google search:

    "parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

    "parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

    "parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

    "parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

    "parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

    "parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5

    -md5sums

    Notice that i am only changing the word after the parent directory, change it to what you

    want and you will get a lot of stuff.

    voila!

    method 2

    ?ww.google.com

    put this string in google search:

    ?intitle:index.of? mp3

    You only need add the name of the song/artist/singer.

    Example: ?intitle:index.of? mp3 jackson

  • 8/2/2019 BIOS Update Procedure

    23/28

    First the safety rules

    The inside of a computer is a bad place full of electricity and sharp edges.On the electricity side always when working on you computer make sure that its still

    plugged in to the power socket and the power is turned off, this is to ensure that any static

    From you is discharged through the earth. The inside of most computer cases areunfinished metal and has very sharp edges so be careful.

    The first signs of a battery failing are:-

    1) your clock starts running slowly

    2) when you boot (start) your computer it has a problem finding your hardware (no hard

    drive, no cd rom)

    To change the battery you need the following tools

    1) a X-point screwdriver2) an anti-static strap(optional)

    3) a new battery (seems logical)

    Then unplug all the cables from the back of the computer as you remove them make a note

    where they came from. (So when you finished you can put them back)

    Move the computer somewhere where you can work on it with ease

    Remove the cover by locating the screws around the outer edge (back) of the computerSome computer cases only require you to remove 2 screws on one side then a panel can be

    removed allowing you access to the computers insides, others you must remove 6 screws

    and remove the whole case by sliding it to the rear and lifting it off.

    Now make sure that you read the safety instructions about static.

    Look inside you will see a round silver thing that looks about the size of a 10p piece(quarter). This is the battery itself, carefully lift the retaining clip and slide the battery out.

    Thats it removed now go to your local computer retailer, electrical retailer (Tandy/Radio

    shack) taking the old battery with you and get a new battery.

    Back to your computer insert the new battery by lifting the clip and sliding the battery in.

    Reinstall your case and plug all the cables back (you did remember to label them didntyou)

    Now for the fun part.

    You will now need to go into you bios.

    Right the bios is the god of your computer.

  • 8/2/2019 BIOS Update Procedure

    24/28

    To access it, when your computer first starts you will see a black screen with white text.

    If you look carefully you will see a line that says something like "press del for setup" or

    some other key (F2 or ESC or tab) this will take you to god's house where you can make

    lots of changes to the way your machine works.

    It is also the place where you can make your nice computer in to a rather expensive door

    stop so be careful and dont go playing with anything.

    You will now be presented with a blue screen with a lot of options on it,

    The one we want is load optimised/default settings.

    Press the F10 key and type y the computer should now reboot.

    If every thing went well then your computer will now be up and running.

    Shizers way: Keep computer running. Lay it on it's side and remove side cover to expose

    MoBo. Take any thin object, "small screwdriver, knife point, wood shiskabob skewer. Pull

    back the battery retaining clip. Toss the old battery in the junk recepticle, unless youbelong to greenpeace and want to save the earth. Install the new battery. No need to reset

    bios becasue the compter supplies voltage to the cmos while it is running. Reset or resync

    clock with internet. Done!

    Keep Folders Hidden

    first create a new folder somewhere on your hard drivewhen you name it hold down "Alt" and press "0160" this will create and invisible space so

    it will apper as if it has no name.

    then right click in and select "Properties" select the tab "coustimize" and select "changeicon" scroll along and you should a few blanc spaces click on any one and click ok when

    you hav saved the settings the folder will be invisible to hide all your personal files

    CTRL+C (Copy)

    CTRL+X (Cut)

    CTRL+V (Paste)CTRL+Z (Undo)

    DELETE (Delete)

    SHIFT+DELETE (Delete the selected item permanently without placing the item in theRecycle Bin)

    CTRL while dragging an item (Copy the selected item)

    CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)

    F2 key (Rename the selected item)

  • 8/2/2019 BIOS Update Procedure

    25/28

    CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)

    CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)

    CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)

    CTRL+SHIFT with any of the arrow keys (Highlight a block of text)

    SHIFT with any of the arrow keys (Select more than one item in a window or on thedesktop, or select text in a document)

    CTRL+A (Select all)

    F3 key (Search for a file or a folder)ALT+ENTER (View the properties for the selected item)

    ALT+F4 (Close the active item, or quit the active program)

    ALT+ENTER (Display the properties of the selected object)

    ALT+SPACEBAR (Open the shortcut menu for the active window)CTRL+F4 (Close the active document in programs that enable you to have multiple

    documents open simultaneously)

    ALT+TAB (Switch between the open items)

    ALT+ESC (Cycle through items in the order that they had been opened)F6 key (Cycle through the screen elements in a window or on the desktop)

    F4 key (Display the Address bar list in My Computer or Windows Explorer)SHIFT+F10 (Display the shortcut menu for the selected item)

    ALT+SPACEBAR (Display the System menu for the active window)

    CTRL+ESC (Display the Start menu)ALT+Underlined letter in a menu name (Display the corresponding menu)

    Underlined letter in a command name on an open menu (Perform the corresponding

    command)

    F10 key (Activate the menu bar in the active program)RIGHT ARROW (Open the next menu to the right, or open a submenu)

    LEFT ARROW (Open the next menu to the left, or close a submenu)

    F5 key (Update the active window)BACKSPACE (View the folder one level up in My Computer or Windows Explorer)

    ESC (Cancel the current task)

    SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM fromautomatically playing)

    Dialog Box Keyboard Shortcuts

    CTRL+TAB (Move forward through the tabs)

    CTRL+SHIFT+TAB (Move backward through the tabs)TAB (Move forward through the options)

    SHIFT+TAB (Move backward through the options)

    ALT+Underlined letter (Perform the corresponding command or select the correspondingoption)

    ENTER (Perform the command for the active option or button)

    SPACEBAR (Select or clear the check box if the active option is a check box)Arrow keys (Select a button if the active option is a group of option buttons)

    F1 key (Display Help)

    F4 key (Display the items in the active list)

    BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open

  • 8/2/2019 BIOS Update Procedure

    26/28

    dialog box)

    Microsoft Natural Keyboard Shortcuts

    Windows Logo (Display or hide the Start menu)Windows Logo+BREAK (Display the System Properties dialog box)

    Windows Logo+D (Display the desktop)

    Windows Logo+M (Minimize all of the windows)Windows Logo+SHIFT+M (Restore the minimized windows)

    Windows Logo+E (Open My Computer)

    Windows Logo+F (Search for a file or a folder)CTRL+Windows Logo+F (Search for computers)

    Windows Logo+F1 (Display Windows Help)

    Windows Logo+ L (Lock the keyboard)

    Windows Logo+R (Open the Run dialog box)Windows Logo+U (Open Utility Manager)

    Accessibility Keyboard Shortcuts

    Right SHIFT for eight seconds (Switch FilterKeys either on or off)

    Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)

    SHIFT five times (Switch the StickyKeys either on or off)NUM LOCK for five seconds (Switch the ToggleKeys either on or off)

    Windows Logo +U (Open Utility Manager)

    Windows Explorer Keyboard ShortcutsEND (Display the bottom of the active window)

    HOME (Display the top of the active window)

    NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected

    folder)NUM LOCK+Plus sign (+) (Display the contents of the selected folder)

    NUM LOCK+Minus sign (-) (Collapse the selected folder)

    LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)RIGHT ARROW (Display the current selection if it is collapsed, or select the first

    subfolder)

    Shortcut Keys for Character MapAfter you double-click a character on the grid of characters, you can move through the grid

    by using the keyboard shortcuts:

    RIGHT ARROW (Move to the right or to the beginning of the next line)

    LEFT ARROW (Move to the left or to the end of the previous line)UP ARROW (Move up one row)

    DOWN ARROW (Move down one row)

    PAGE UP (Move up one screen at a time)PAGE DOWN (Move down one screen at a time)

    HOME (Move to the beginning of the line)

    END (Move to the end of the line)CTRL+HOME (Move to the first character)

    CTRL+END (Move to the last character)

    SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

    Microsoft Management Console (MMC) Main Window Keyboard Shortcuts

  • 8/2/2019 BIOS Update Procedure

    27/28

    CTRL+O (Open a saved console)

    CTRL+N (Open a new console)

    CTRL+S (Save the open console)CTRL+M (Add or remove a console item)

    CTRL+W (Open a new window)

    F5 key (Update the content of all console windows)ALT+SPACEBAR (Display the MMC window menu)

    ALT+F4 (Close the console)

    ALT+A (Display the Action menu)ALT+V (Display the View menu)

    ALT+F (Display the File menu)

    ALT+O (Display the Favorites menu)

    MMC Console Window Keyboard ShortcutsCTRL+P (Print the current page or active pane)

    ALT+Minus sign (-) (Display the window menu for the active console window)

    SHIFT+F10 (Display the Action shortcut menu for the selected item)

    F1 key (Open the Help topic, if any, for the selected item)F5 key (Update the content of all console windows)

    CTRL+F10 (Maximize the active console window)CTRL+F5 (Restore the active console window)

    ALT+ENTER (Display the Properties dialog box, if any, for the selected item)

    F2 key (Rename the selected item)CTRL+F4 (Close the active console window. When a console has only one console

    window, this shortcut closes the console)

    Remote Desktop Connection Navigation

    CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)ALT+PAGE UP (Switch between programs from left to right)

    ALT+PAGE DOWN (Switch between programs from right to left)

    ALT+INSERT (Cycle through the programs in most recently used order)ALT+HOME (Display the Start menu)

    CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)

    ALT+DELETE (Display the Windows menu)CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the

    Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN

    on a local computer.)

    CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on theTerminal server clipboard and provide the same functionality as pressing ALT+PRINT

    SCREEN on a local computer.)

    Microsoft Internet Explorer NavigationCTRL+B (Open the Organize Favorites dialog box)

    CTRL+E (Open the Search bar)

    CTRL+F (Start the Find utility)CTRL+H (Open the History bar)

    CTRL+I (Open the Favorites bar)

    CTRL+L (Open the Open dialog box)

    CTRL+N (Start another instance of the browser with the same Web address)

  • 8/2/2019 BIOS Update Procedure

    28/28

    CTRL+O (Open the Open dialog box, the same as CTRL+L)

    CTRL+P (Open the Print dialog box)

    CTRL+R (Update the current Web page)CTRL+W (Close the current window)

    ______________________________