BIOSAgentPlus safely checks to see if a newer BIOS Update is available for your computer and provides instant access to your detailed BIOS and driver report.
- Certificate Serial Number & Fingerprint It is important to check the serial number and fingerprint of each certificate before installation. You can verify the serial number and fingerprint of a certificate using OpenSSL, and running the following command to return the serial number and SHA1 fingerprint: openssl x509 -noout -serial -fingerprint.
- I'd like to find the manufacturer, model and serial number of various Windows (XP, Vista, 2003, 2008) and Linux (Ubuntu, Debian, Fedora) machines via a software solution. Currently our hardware inventory is out of date, so I'd like a quick rapid way to get this information via a software solution (so I don't need to approach every single.
- What is the HPE Nimble Storage Proactive Support Manager (HPE Nimble Storage PSM) Service? Answer: HPE Nimble Storage PSM is a liaison service that acts as your trusted advisor and an extension of your team that will be with you every step of the way.The service provides a smooth transition from install, to integration, to break/fix, through expansion.
Locating your SNID or Serial Number. Where can I find my Acer serial number or SNID code? Products that have a Windows operating system and can power on can use the Acer System Information tool to retrieve the serial number or SNID. Please click your product type below for information on how to retrieve the serial number or SNID code of your.
BIOS Master- and Setup-Passwords
Delete BIOS-Passwords on PC-Mainboards
Delete BIOS-Passwords on Notebooks
BIOS-Setup-Password via Software
BIOS Master-Passwords
Delete BIOS-Boot Password
Delete BIOS-Setup Password
Keystrokes to Enter the BIOS-Setup
Clear the CMOS of your PC-Mainboard if you want to reset the BIOS-Boot password or BIOS-Setup password:
CMOS-Reset instructions for PC-Mainboards and Notebooks
Delete BIOS-Boot Password
Delete BIOS-Setup Password
Don't clear the CMOS of your Notebook, because it will not reset any BIOS-Boot password or BIOS-Setup password! Notebooks have better theft protections like an additional (tiny, hidden) IC-integrated module that contains the password. Some manufacturers store the password on a hidden hard disk sector. So, the only solution is a direct contact to the manufacturer's support, where they proof that you are the legal owner of the notebook. Depending on the manufacturer, you have to send him the serial number of the notebook and you'll get (in many cases free of charge) an individual master password to unlock the notebook. Some other manufacturers even offer only the replacement of the notebook's mainboard - which will be really expensive!
You can download the free, small program ctbios15.zip from the german Computermagazine c't. Ctbios shows the password and some other interesting things about your BIOS. (great tip!)
Lost your BIOS-Setup password or BIOS-Boot password? You can try one of the following Master passwords:
AWARD Master passwords | ||
01322222 | bios | lkw peter |
1EAAh | BIOS | lkwpeter |
256256 | biostar | PASSWORD |
589589 | biosstar | SER |
589721 | CONCAT | setup |
?award | CONDO | SKY_FOX |
admin | condo | SWITCHES_SW |
alfarome | djonet | Sxyz |
aLLy | efmukl | SZYX |
aPAf | g6PJ | t0ch88 |
award | h6BB | t0ch20x |
award_? | HELGA-S | ttptha |
award.sw | HEWITT RAND | TTPTHA |
AWARD SW | HLT | TzqF |
AWARD_SW | j09F | wodj |
AWARD_PW | j256 | ZAAADA |
award_ps | j262 | zbaaaca |
AWARD?SW | j322 | zjaaadc |
awkward | j64 | zjaaade |
AMI Master passwords | ||
ami | amiami | CMOSPWD |
amidecod | AMI.KEY | KILLCMOS |
amipswd | AMISETUP | 589589 |
AMIPSWD | AMI?SW | ami.kez |
AMI | AMI!SW | ami° |
A.M.I. | AMI_SW | helgasss |
aammii | bios310 | HEWITT RAND |
AMI~ | BIOSPASS |
Master passwords from different Manufacturers |
Advance Integration: Advance |
Amptron: Polrty |
AST: SnuFG5 |
Biostar: Biostar / Q54arwms |
Compaq:compaq |
Concord: last |
CTX International: CTX_123 |
CyberMax: Congress |
Daytek+Daewoo:Daytec/Daewuu |
DELL: DELL |
Digital Equipment: komprie |
Enox: xo11nE |
Epox: central |
Freetech: Posterie |
HP Vectra Serie: hewlpack |
IBM: IBM / MBIUO / sertafu |
IBMAptiva: press both mousekeys |
Iwill: iwill |
Jet Way: spoom1 |
Joss Techn.: 57gbz6 / Technolgi |
MachSpeed: sp99dd |
Magic-Pro: prost |
Megastar: Star |
Micron: sldkj754 / xyzall |
Micronics: dn_04rjc |
M Technology: mMmM |
Nimble: xdfk9874t3 |
Packard Bell: Bell9 |
QDI: QDI |
Quantex: teX1 / xljlbj |
Research: Col2ogro2 |
Shuttle: Spacve |
Siemens Nixdorf: SKY_FOX |
Speedeasy: lesarot1 |
SuperMicro: ksdjfg934t |
Tiny: Tiny |
TMC: BIGO |
Toshiba:24Banc81/Toshiba/toshy99 |
ToshibaLaptops: press left Shiftkey |
Vextrec Technology: Vextrec |
Vobis: merlin |
WIMBIOS v2.10: Compleri |
Zenith: 3098z / Zenith |
Zeos: zeosx |
If you have forgotten your BIOS Boot-Password, have a look into your mainboard manual, or after opening your PC, onto your mainboard. Many mainboards have a JUMPER or SWITCH to clear the CMOS. This Jumper is often named like: 'RTC_CLEAR' , 'CLEAR CMOS' , 'CLRCMOS' , 'CLRCMS'. His position is often near by the mainboard battery.
Attention: All hardware settings (harddisk-, bootsequence,-...settings) will be deleted! At least, you have to re-insert them again.
See: CMOS-Reset instructions for PC-Mainboards and Notebooks
If you can't enter the Setup of your BIOS, you need a DOS-Bootdisk and one of the following MS-DOS Files:
Filename | Sourcecode I | Sourcecode II |
DEBUG.EXE | - o 70 2E - o 71 FF - Q | - o 70 17 - o 71 17 - Q |
QBASIC.EXE | - 10 OUT &H70,17 - 20 OUT &H71,0 | - 10 OUT &H70,&H17 - 20 OUT &H71,&H17 |
Start the file an insert the sourcecode line by line.
Different keystrokes to enter the BIOS-Setup:
Keystrokes | Manufacturer |
Del | AMI, AWARD |
ESC | Toshiba |
F1 | Toshiba, Phoenix and later models from Late model PS/1 Value Point and 330s |
F2 | NEC, Dell |
F10 | Compaq |
Ins | IBM PS/2s |
twice Reset | Dell |
Alt+Return | Dell |
Alt+'?' | some PS/2-Models |
Ctrl+Esc | General |
Ctrl+Ins | some PS/2-Models |
Ctrl+Alt+Esc | AST Advantage, Award, Tandon |
Ctrl+Alt+'+' | General |
Ctrl+Alt+S | Phoenix |
Ctrl+Alt+Ins | Zenith, Phoenix |
Ctrl+S | Phoenix |
Ctrl+Shift+Esc | Tandon 386er |
Ctrl+Shift+Alt +Del(num.Keypad) | Olivetti PC Pro |
Setupdisk | Compaq, Epson, IBM, Toshiba, 286er |
Most wanted
Favorite items
ACER ASPIRE T180
SMD-PLCC-32 Socket
ASUS P5W DH DELUXE
ASROCK Z77 EXTREME4
ASUS M5A78L-M/USB3
internal Speaker
ASUS P8P67
ACER ASPIRE E380
ASUS Z9PE-D8 WS
ASUS M5A99X EVO
ASUS M4A89GTD PRO/USB3
ASROCK P67 PRO3
ASUS CROSSHAIR IV FORMULA
ASUS M2N-SLI DELUXE
ASUS CROSSHAIR V FORMULA
ASROCK 970 EXTREME4
ASUS P8H67-M PRO REV.3.0
ASROCK 870 EXTREME3 R2.0
ACER ASPIRE L5100
New BIOS-Chips
ASUS M4A89GTD PRO/USB3
ASUS A68HM-PLUS
ASUS P5LD2 SE
ASUS M5A99X EVO R2.0
internal Speaker
ASUS M4A89TD PRO/USB3
ASROCK Z68M-ITX/HT
ACER ASPIRE L3600
ASUS P8P67
I covered the power of Infosight based on a Nimble array in the last two articles but hey, that is in the cloud….so let’s descend to the controllers’ deep hearth and sqeeze the most information we can. First of all some of those which cannot be found on GUI or it is not that detailed.
As a start, open up you favourite SSH client and connect to the array. Run “array –info name_of_your_array” command. The output will contain how many additional cards with how many and what type of ports are in the controllers and besides that it shows all aspects of capacity and consumed space. Down below you can see that my snapshots are compressed 201,7:1.
If you take your audit requirements seriously, than you do use a syslog, but here you can also get detailed information about who did what, when, which interface. Command is “auditlog –list“. It can be filtered to a user, to a time period, to the used connection method.
Above that is just the list of events, so let’s extract some detailed information about a particular login. It is simple “auditlog –info eventnumber” so in my example this is displayed. User “admin” has logged in through API and the Application name was Veeam. This is the backup software I use for this array.
The next command is my favourite and it list all the physical disk in a group/array “disk –list”. I admit this is shown on the GUI too, but there you need to hover the mouse above the bay and surely that is not a list just a “tooltip”. This command can help you to identify and inventory your serial numbers in your CMDB if needed. Their status is reported too.
You have all heard about the HPE SSDs that are affected by the PowerOnHours bug. Nimble arrays are not affected! Anyway I think it might be important to fetch the SMART data from the drives in the array. This is quite simpe “disk –info disk_number” can do that and many more, like exact firmware version on the disk, the rebuild state if you have changed that drive recently.
The next command’s output is something that is almost there on the GUI, but wait. Let’s run “fc –list” – well I use my array over FC. This will give back the applicable port speeds WWNN and WWPN identifiers.
But let’s use this and run detailed query specific to a port “fc –info port_name –ctrlr A/B“. Clearly states that the port on the array could do 16Gbit, but I am running 8Gbit only, what is the fiwmare on this “HBA”, fabric WWN is reported, so as the initiators that are connected to this port.
Not that we talk about initiators, we need to know about the limits and maximums that an array or a group can support. The next command lists these and also the consumed counts to each of those types. “netconfig –list“
If we would like to know a bit more about the controller connectivity “ip –list” and “netconfig –list” are the primary ones. It reports which controller is active, when was the last network related change in the configuration – on the array. It is quite handy to see the actual ports speeds here too.
Performance policy must not be new to anyone here, but how could we get more information in a list form about them? Simply by running “perfpolicy –list“, which shows their block size, caching and compression details too. If this is still not enough they can be queried by “perfpolicy –info“.
The “pool –info pool_name” is useful when you need to report all kind of capacity/consumption, volume, deco numbers. I have only one array in the pool, so not that groundbreaking, but you can imagine.
If there is at least one additional shelf the next command is your friend, but I’d not discard it just because you don’t have any. Output shows the fans speeds, temperature specifics. “shelf –list“
I hope you have snapshot schedule already as it is free and the best protection as last resort you can have. Bulk output especially the new data in them can be extracted by running “snap –list –vol volume_name“
Select one and run the “snap –info snapshot_name –vol volume_name” and this will tell the compression ratio of that snap, if it is replicated, online and exported to any initiator. We will talk about the “Is Managed” part later.
Let’s run some performance reports. GUI does this just fine, but if you want to go deeper like Dicaprio does that in Inception you are free to do so by running “stats –perf volume_name –iosize –interval 60” to have the tipical IO size reported.
If you are keen to know the IO served by all disk – you can query only one if you want too – “stats –disk all –hdr 1” is at your service. This shows and updated the data per second. If only one disk is important for you replace all with the disk number.
IOPS is one thing, but it is like describing a car with horsepower only, and not by both that and torque. Latency is also important and this command can report that for a volume for example “stats –perf “volume_name” –latency –interval 60“. Sequential, random, read, write etc.
Up to this point all commands were queries, they were not doing any modification to any configuration. But now let’s set the – IMHO – top most important thing. Earlier I mentioned “Is Unmanaged” property at the snapshot part. A snapshot is unmanaged when it was not created by a schedule due to replication or protection, but manually or by a 3rd party application. These unmanaged snapshots are to be retained forewer so if the 3rd party app or a human don’t remove them, they will consume space till infinity.
Let’s first query if we have any unmanaged snapshots that are older than 30 days. Do this by running group -autoclean_unmanaged_snapshots check –snap_ttl_unit days –snap_ttl 30″
Find Nimble Serial Number
If we’d like to set the automatic removal of unmanaged snapshots after 30 days, set this up by entering “group –autoclean_unmanaged_snapshots on –snap_ttl_unit days –snap_ttl 30” command. This is group level setting.
Summary
Find Nimble Serial Number Free
Nimble CLI is quite smart and if you want to utilize it more your starting point should be the CLI guide at Infosight page.