<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bios Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/bios/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Sun, 01 May 2022 03:48:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How to enter the BIOS from Windows</title>
		<link>https://www.osradar.com/how-to-enter-the-bios-from-windows/</link>
					<comments>https://www.osradar.com/how-to-enter-the-bios-from-windows/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Sun, 15 May 2022 21:47:00 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[bios]]></category>
		<category><![CDATA[pc]]></category>
		<category><![CDATA[uefi]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=35905</guid>

					<description><![CDATA[<p>Hello! The BIOS (UEFI) is a very important part of the computer and somewhat unknown to many users. It is as important as the RAM or the motherboard. That&#8217;s why today we are going to learn how we can access it from our Windows 10 or 11. There are many parts of the computer that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-enter-the-bios-from-windows/">How to enter the BIOS from Windows</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! The BIOS (UEFI) is a very important part of the computer and somewhat unknown to many users. It is as important as the RAM or the motherboard. That&#8217;s why today we are going to learn how we can access it from our Windows 10 or 11. There are many parts of the computer that we probably don&#8217;t know or that we have vaguely heard about somewhere, without understanding exactly what it was. That usually happens with the BIOS, a part of the PC that many people have never entered. As a result, they don&#8217;t know what exactly it does. It&#8217;s a tricky part of the system and without knowledge it can even be a bit dangerous. For that reason we should always be careful what we select if we are inside.</p>



<h2>What exactly is the BIOS?</h2>



<p>We are talking about low-level <a href="https://www.osradar.com/how-to-enable-or-disable-netbios-over-tcpip-windows-10/" target="_blank" rel="noreferrer noopener">software </a>that is embedded on the computer&#8217;s motherboard. Its main mission is to check that all the PC hardware is working properly. By entering the BIOS we can customize everything about the operation of the PC. In addition, we can perform tasks such as enabling XMP profiles to change the RAM speed, boot from a disk or USB drive as well as overclocking.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="639" height="579" src="https://www.osradar.com/wp-content/uploads/2022/05/bios.png" alt="" class="wp-image-35906" srcset="https://www.osradar.com/wp-content/uploads/2022/05/bios.png 639w, https://www.osradar.com/wp-content/uploads/2022/05/bios-300x272.png 300w" sizes="(max-width: 639px) 100vw, 639px" /></figure>



<p>In recent times the BIOS has been renamed to UEFI. Consequently, adding new features, although colloquially it is still colloquially called BIOS, even though it is not really BIOS anymore. There are several ways to log in from Windows 10 and Windows 11 operating systems, which we are going to start talking about right now.</p>



<h3>Log on when turning on the computer</h3>



<p>We can enter the BIOS when we start the computer and the manufacturer&#8217;s logo is displayed. Consequently, we must press a key when we are in that computer startup screen and thus make the BIOS visible. Normally, it is indicated at the bottom of the screen when and which key to press. Generally, the F2, Del, F4 or F8 keys usually work to enter the BIOS. However, this is not always the case. Therefore, it is good to check to see which one the system starts up with.</p>



<p>Of course, sometimes we do not visualize which key to press. It may be that the letters pass too fast or you can&#8217;t locate it where it says so. In such a case it may be that you have Fast Boot enabled in the BIOS or Windows Fast Startup mode. If with this method you have not been able to access the BIOS, we show you others that will surely be easier to perform or at least more intuitive.</p>



<h3>Login from Windows</h3>



<p>To be able to enter the BIOS from<a href="https://www.microsoft.com/en-us/software-download/windows10" target="_blank" rel="noreferrer noopener"> Windows</a> we have several ways that we are going to see right now. You will see how easy it is to access from Windows, you only have to do the following:</p>



<ul><li>We enter the Windows Start menu.</li><li>Now we must click on the Start button, that one that we pressed before giving to the one to turn off the system.</li><li>At that moment we will see the options that always leave us that are Sleep, Restart or Shutdown.</li><li>At that moment we must maintain pressed the Shift key and then click on Restart.</li></ul>



<figure class="wp-block-image size-full"><img loading="lazy" width="247" height="350" src="https://www.osradar.com/wp-content/uploads/2022/05/bios2.png" alt="" class="wp-image-35907" srcset="https://www.osradar.com/wp-content/uploads/2022/05/bios2.png 247w, https://www.osradar.com/wp-content/uploads/2022/05/bios2-212x300.png 212w" sizes="(max-width: 247px) 100vw, 247px" /></figure>



<h3>Another options</h3>



<p>As we mentioned, there are other ways to access the BIOS, if you don&#8217;t like the one we have shown you. One such alternative is as follows:</p>



<ul><li>We enter the start menu.</li><li>At that moment we click on <strong>Update &amp; System,</strong> and then click on <strong>Recovery</strong>.</li><li>Now that we are in <strong>Recovery </strong>we will see how inside <strong>Recovery Options. </strong>Accordingly, there is a function called <strong>Advanced Startup</strong> that has a button that says <strong>Restart Now</strong>. Please click on it so that the computer resets and we can enter the BIOS.</li></ul>



<p>Whichever method you use, you will see a blue screen with multiple options appear in front of you. Now just follow these steps and you will be able to enter the BIOS:</p>



<ul><li>We go to <strong>Troubleshooting.</strong></li><li>Then we must click on <strong>Advanced Options.</strong></li><li>The next thing is to click on <strong>UEFI Firmware Configuration.</strong></li></ul>



<p>If we do not see the UEFI Firmware Configuration option, there are two possible explanations. The first is that the computer we are using does not have UEFI, which is quite likely if it is old. Consequently, it will have a BIOS in the classic sense. The second possibility is that the motherboard does have UEFI, but Windows 10 boots from a drive that was partitioned using MBR and not GPT. If this is the case, it is the MBR system that will force UEFI to use a legacy BIOS mode, making it impossible to access from Windows.</p>



<h3>Access from the command prompt</h3>



<p>We can also access the BIOS from the command prompt in a quite simple way. These are the steps to follow if you want to use this other option that we present to you:</p>



<ul><li>We enter the start menu and in the part where it allows us to write we put <strong>CMD </strong>and as soon as it detects it we must enter the command prompt, but pressing Run as Administrator.</li><li>Once inside the command prompt we must type <strong>shutdown /r /fw</strong> in the command prompt window and press Enter.</li><li>You should now see a screen informing you that your PC will shut down in less than a minute.</li><li>We can also type <strong>shutdown /r /fw /t</strong> at the command prompt to eliminate the waiting period and reboot instantly.</li></ul>



<p>If after doing this you get a message that says The firmware of this system does not support the bootable user interface in the firmware, it means that the motherboard does not have UEFI or there is an MBR partition. These are the ways we have in Windows 10 and Windows 11 to get into the BIOS or UEFI. As you will see it is all very simple so it does not have a great complication to get it. Very well, it has been a pleasure to show you how to access the BIOS from Windows. See you later</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-enter-the-bios-from-windows/">How to enter the BIOS from Windows</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-enter-the-bios-from-windows/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LoJax – First UEFI Rootkit in the Wild</title>
		<link>https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/</link>
					<comments>https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 09:58:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[bios]]></category>
		<category><![CDATA[bios rootkit]]></category>
		<category><![CDATA[rootkit]]></category>
		<category><![CDATA[uefi]]></category>
		<category><![CDATA[uefi firmware]]></category>
		<category><![CDATA[uefi malware]]></category>
		<category><![CDATA[uefi rootkit]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=6100</guid>

					<description><![CDATA[<p>A group of security researchers tracking the operations of a cyber-espionage group discovered a new rootkit that works on UEFI (Unified Extensible Firmware Interface) and currently in operation in the wild. According to ESET, this threat actor integrated the rootkit in the SPI flash module on the target computer. This allows the rootkit persistence over [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/">LoJax – First UEFI Rootkit in the Wild</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A group of security researchers tracking the operations of a cyber-espionage group discovered a new rootkit that works on UEFI (Unified Extensible Firmware Interface) and currently in operation in the wild.</p>
<p>According to ESET, this threat actor integrated the rootkit in the SPI flash module on the target computer. This allows the rootkit persistence over the system even if components like the OS and/or hard drive are replaced. That’s a very powerful ability and dangerous.</p>
<p>The security researchers gave the rootkit a nice name – LoJax. The name came from the malicious samples of the LoJack anti-theft software.</p>
<h1>Signed drivers for accessing the firmware</h1>
<p><img loading="lazy" class="size-full wp-image-6101 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/09/trusted.jpg" alt="" width="800" height="550" srcset="https://www.osradar.com/wp-content/uploads/2018/09/trusted.jpg 800w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-300x206.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-768x528.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-100x70.jpg 100w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-218x150.jpg 218w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-696x479.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-611x420.jpg 611w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p>According to the security researchers, there were 3 different types of tools on the victim’s computers where 2 of them gathers the details about the system firmware and creates a copy of the system firmware by reading the SPI flash memory module.</p>
<p>The last one then injects the malicious module inside the gathered firmware copy. Then, the modified copy is flashed to the SPI flash memory. Thus, ultimate persistency for the malware.</p>
<p>For reaching the UEFI settings, all the tools present in the rootkit uses the kernel driver of the <a href="http://rweverything.com/">RWEverything</a> – a tool giving the power to modify all the settings and firmware of almost ALL the hardware. The driver comes up with a valid certificate and that’s the catch.</p>
<p>According to ESET, the patching tool uses various techniques for abusing the misconfiguration of the system or even bypass the SPI flash memory write protections. If the write operations are denied from the system, then the rootkit exploits a 4-years old race condition vulnerability in UEFI (CVE-2014-8273) for bypassing this defense.</p>
<p>The ultimate target of the rootkit is just dropping the malware into the Windows system and making sure that it integrates in the OS every time the system boots.</p>
<h1>Defense against LoJax</h1>
<p><img loading="lazy" class=" wp-image-6102 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/09/defense-against-lojax.jpg" alt="" width="705" height="470" srcset="https://www.osradar.com/wp-content/uploads/2018/09/defense-against-lojax.jpg 630w, https://www.osradar.com/wp-content/uploads/2018/09/defense-against-lojax-300x200.jpg 300w" sizes="(max-width: 705px) 100vw, 705px" /></p>
<p>Despite using advanced methods, LoJax is easily defendable with the currently available methods. First of all, make sure that you enable “Secure Boot” mechanism. This ensures that everything that’s loaded in the system firmware comes up with a valid certificate. LoJax isn’t signed, so it won’t be able to load due to “Secure Boot”.</p>
<p>Another very crucial thing is to make sure that your motherboard has the latest version of firmware. For upgrading your motherboard firmware, check out the official website of your motherboard vendor. After upgrading to the latest version, the firmware should fix and tighten the protection for the SPI flash memory module.</p>
<p>If your system has the latest firmware, you can reflash the firmware. It involves downloading the latest firmware package from motherboard vendor’s website and applying it again. Different motherboard vendors provide different ways of reflashing/updating the firmware.</p>
<p>LoJax is a threat for high-value targets, so general users shouldn’t be afraid of it just yet. Make sure that you take the necessary steps to tighten your system security and you’re good to go!</p>
<p>Cheers!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/">LoJax – First UEFI Rootkit in the Wild</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
