SlideShare a Scribd company logo
1 of 17
Enablement of HDD Password
using CCTK
Description of Task
Enablement of HDD(Hard disk drive) password on Dell client systems.

Prerequisites
Check the availability of Hard disk option in the Security section of F2 screen or by using “hddinfo” token
in CCTK.
Note :1. User should login as administrator mode to perform HDD password set/clear operation.
2. Current PPT will explain how to enable HDD password on a system.
3. This feature is supported on CCTK 2.2 onwards.
3. Below commands will provide necessary usage information on HDD password related CCTK tokens.
cctk -h hddinfo
cctk -h hddpwd
4. Below command can be used to set HDD Password for single or multiple HDD.
cctk –hddpwd=<password>
Step 1 Check for HDD in BIOS Setup. Check for Number of HDD availability in BIOS setup as below. For all HDD
available on the system we can set a unique password using CCTK.
BIOS screenshot of a system which as single HDD

BIOS screenshot of a system which as two HDD
Step 2 Check for --Hddinfo command usage in CCTK. This Command will provide the help information for the hddinfo
command in CCTK.
Step 3 Check for Number of HDD available: Number of available HDD’s on system can be checked by executing “cctk
--hddinfo” and check the Pwd-Protected field to check the password is set or not . (No-> Password is not set for HDD,
Yes-> Password is set for HDD)
Step 4 Help info to set a password for HDD: This Command will provide the help information to set HDD password
on the system.
Step 5 To Set HDD password using CCTK: Type the below command to set the password for HDD, after successful
command execution system will ask for restart(Please check the next slide for confirmation).
Step 6 Setting HDD password using CCTK: Type cctk.exe --hddinfo, check the status of Pending –restart field to
check restart is required or not (No-> Restart is not required, Yes-> Restart is required).
Step 7 After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command
execution (of step 4)and “Ignore“ option to undo the previous CCTK command operation(of step 4).
Select Modify Option from below pop up window
Step 8 After Selecting Modify operation(in Step 7) , SUT will restart and it will boot into OS ,Check the status
of the field “Pwd-Protected” in CCTK using hddinfo.
Step 9: Restart the system and enter the password in the pop-up window for HDD.
Step 10. Reboot the system ,enter to the F2 screen and check password set through CCTK command is reflected in
BIOS screen.
Scenario 2:
Step 11 Clearing HDD password Using CCTK : Syntax: cctk –hddpwd= <Blank space> --valsetuppwd=<Valid Password
which is Set >.
Step 12: Check the status of Pending-Restart field: Check the status of Pending-Restart field and reboot is required
for the changes to take effect (No-> Restart is not required, Yes-> Restart is required).
Step 13: After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command execution
(of step 12)and “Ignore“ option to undo the previous CCTK command operation(of step 12).
Select Modify Option from below pop up window
Step 14 Check the status of Pwd-Protected field. Check the status of Pwd-Protected field which indicate password is
cleared.
Step 15. Reboot the system enter to the F2 screen and check HDD password is not set is reflected in BIOS screen.

More Related Content

Viewers also liked

Abusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingAbusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingMarco Balduzzi
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов SmallKamchibekova Rakia
 
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
ОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октябряОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октября
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октябряАсылбек Айтматов
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in CloudSanoj Kumar
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)Marco Balduzzi
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...Marco Balduzzi
 
Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Venkatesh Prabhu
 
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)Marco Balduzzi
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
TUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMTUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMika aprilia
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime InvestigationsMarco Balduzzi
 
Paper: A Solution for the Automated Detection of Clickjacking Attacks
Paper: A Solution for the Automated Detection of Clickjacking AttacksPaper: A Solution for the Automated Detection of Clickjacking Attacks
Paper: A Solution for the Automated Detection of Clickjacking AttacksMarco Balduzzi
 
Hack an ASP .NET website? Hard, but possible!
Hack an ASP .NET website? Hard, but possible! Hack an ASP .NET website? Hard, but possible!
Hack an ASP .NET website? Hard, but possible! Vladimir Kochetkov
 
Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554TISA
 
OWASP Pune Chapter : Dive Into The Profound Web Attacks
OWASP Pune Chapter : Dive Into The Profound Web AttacksOWASP Pune Chapter : Dive Into The Profound Web Attacks
OWASP Pune Chapter : Dive Into The Profound Web AttacksNarendra Bhati
 

Viewers also liked (20)

Possessive adjectives
Possessive adjectivesPossessive adjectives
Possessive adjectives
 
Abusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingAbusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User Profiling
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов Small
 
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
ОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октябряОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октября
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in Cloud
 
Why AIS is not always enough
Why AIS is not always enoughWhy AIS is not always enough
Why AIS is not always enough
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
 
Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...
 
Adauga un text
Adauga un textAdauga un text
Adauga un text
 
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Christmas
ChristmasChristmas
Christmas
 
TUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMTUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEM
 
Presentation1
Presentation1Presentation1
Presentation1
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 
Paper: A Solution for the Automated Detection of Clickjacking Attacks
Paper: A Solution for the Automated Detection of Clickjacking AttacksPaper: A Solution for the Automated Detection of Clickjacking Attacks
Paper: A Solution for the Automated Detection of Clickjacking Attacks
 
Hack an ASP .NET website? Hard, but possible!
Hack an ASP .NET website? Hard, but possible! Hack an ASP .NET website? Hard, but possible!
Hack an ASP .NET website? Hard, but possible!
 
Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554
 
OWASP Pune Chapter : Dive Into The Profound Web Attacks
OWASP Pune Chapter : Dive Into The Profound Web AttacksOWASP Pune Chapter : Dive Into The Profound Web Attacks
OWASP Pune Chapter : Dive Into The Profound Web Attacks
 

Similar to Cctk support for setting hdd password

Dell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokensDell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokensartisriva
 
CCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokensCCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokensartisriva
 
Advanced Diagnostics 2
Advanced Diagnostics 2Advanced Diagnostics 2
Advanced Diagnostics 2Aero Plane
 
Copy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopCopy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopIT Tech
 
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告fm2008
 
Microsoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setupMicrosoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setupYan Vugenfirer
 
12040 pswdrec-2900xl
12040 pswdrec-2900xl12040 pswdrec-2900xl
12040 pswdrec-2900xlbasschuck2411
 
Router and switch basics configuration
Router and switch basics configurationRouter and switch basics configuration
Router and switch basics configurationMissangae
 
Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*Intel® Software
 
Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021Jian-Hong Pan
 
Armboot process zeelogic
Armboot process zeelogicArmboot process zeelogic
Armboot process zeelogicAleem Shariff
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course workIsmail Mukiibi
 
Optiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-usOptiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-usBk Rathi
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryRevolucion
 
Dual boot with a vhd final
Dual boot with a vhd finalDual boot with a vhd final
Dual boot with a vhd finalOsimondo
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...Symantec
 

Similar to Cctk support for setting hdd password (20)

Dell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokensDell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokens
 
CCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokensCCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokens
 
Advanced Diagnostics 2
Advanced Diagnostics 2Advanced Diagnostics 2
Advanced Diagnostics 2
 
Copy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopCopy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptop
 
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
 
Microsoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setupMicrosoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setup
 
12040 pswdrec-2900xl
12040 pswdrec-2900xl12040 pswdrec-2900xl
12040 pswdrec-2900xl
 
BeagleBoard-xM Booting Process
BeagleBoard-xM Booting ProcessBeagleBoard-xM Booting Process
BeagleBoard-xM Booting Process
 
Router and switch basics configuration
Router and switch basics configurationRouter and switch basics configuration
Router and switch basics configuration
 
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
 
Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*
 
Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021
 
Armboot process zeelogic
Armboot process zeelogicArmboot process zeelogic
Armboot process zeelogic
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 
Optiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-usOptiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-us
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & Recovery
 
Bitlocker configuration
Bitlocker configurationBitlocker configuration
Bitlocker configuration
 
Nvidia smi.1
Nvidia smi.1Nvidia smi.1
Nvidia smi.1
 
Dual boot with a vhd final
Dual boot with a vhd finalDual boot with a vhd final
Dual boot with a vhd final
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 

More from artisriva

Dcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokensDcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokensartisriva
 
Dcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokensDcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokensartisriva
 
Powershell dcpp
Powershell dcppPowershell dcpp
Powershell dcppartisriva
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
DCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokensDCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokensartisriva
 
DCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokensDCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokensartisriva
 
OMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensOMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensartisriva
 
Dell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcipDell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcipartisriva
 
Omci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokensOmci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokensartisriva
 
Linux training
Linux trainingLinux training
Linux trainingartisriva
 

More from artisriva (10)

Dcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokensDcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokens
 
Dcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokensDcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokens
 
Powershell dcpp
Powershell dcppPowershell dcpp
Powershell dcpp
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
DCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokensDCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokens
 
DCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokensDCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokens
 
OMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensOMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokens
 
Dell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcipDell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcip
 
Omci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokensOmci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokens
 
Linux training
Linux trainingLinux training
Linux training
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Cctk support for setting hdd password

  • 1. Enablement of HDD Password using CCTK
  • 2. Description of Task Enablement of HDD(Hard disk drive) password on Dell client systems. Prerequisites Check the availability of Hard disk option in the Security section of F2 screen or by using “hddinfo” token in CCTK. Note :1. User should login as administrator mode to perform HDD password set/clear operation. 2. Current PPT will explain how to enable HDD password on a system. 3. This feature is supported on CCTK 2.2 onwards. 3. Below commands will provide necessary usage information on HDD password related CCTK tokens. cctk -h hddinfo cctk -h hddpwd 4. Below command can be used to set HDD Password for single or multiple HDD. cctk –hddpwd=<password>
  • 3. Step 1 Check for HDD in BIOS Setup. Check for Number of HDD availability in BIOS setup as below. For all HDD available on the system we can set a unique password using CCTK. BIOS screenshot of a system which as single HDD BIOS screenshot of a system which as two HDD
  • 4. Step 2 Check for --Hddinfo command usage in CCTK. This Command will provide the help information for the hddinfo command in CCTK.
  • 5. Step 3 Check for Number of HDD available: Number of available HDD’s on system can be checked by executing “cctk --hddinfo” and check the Pwd-Protected field to check the password is set or not . (No-> Password is not set for HDD, Yes-> Password is set for HDD)
  • 6. Step 4 Help info to set a password for HDD: This Command will provide the help information to set HDD password on the system.
  • 7. Step 5 To Set HDD password using CCTK: Type the below command to set the password for HDD, after successful command execution system will ask for restart(Please check the next slide for confirmation).
  • 8. Step 6 Setting HDD password using CCTK: Type cctk.exe --hddinfo, check the status of Pending –restart field to check restart is required or not (No-> Restart is not required, Yes-> Restart is required).
  • 9. Step 7 After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command execution (of step 4)and “Ignore“ option to undo the previous CCTK command operation(of step 4). Select Modify Option from below pop up window
  • 10. Step 8 After Selecting Modify operation(in Step 7) , SUT will restart and it will boot into OS ,Check the status of the field “Pwd-Protected” in CCTK using hddinfo.
  • 11. Step 9: Restart the system and enter the password in the pop-up window for HDD.
  • 12. Step 10. Reboot the system ,enter to the F2 screen and check password set through CCTK command is reflected in BIOS screen.
  • 13. Scenario 2: Step 11 Clearing HDD password Using CCTK : Syntax: cctk –hddpwd= <Blank space> --valsetuppwd=<Valid Password which is Set >.
  • 14. Step 12: Check the status of Pending-Restart field: Check the status of Pending-Restart field and reboot is required for the changes to take effect (No-> Restart is not required, Yes-> Restart is required).
  • 15. Step 13: After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command execution (of step 12)and “Ignore“ option to undo the previous CCTK command operation(of step 12). Select Modify Option from below pop up window
  • 16. Step 14 Check the status of Pwd-Protected field. Check the status of Pwd-Protected field which indicate password is cleared.
  • 17. Step 15. Reboot the system enter to the F2 screen and check HDD password is not set is reflected in BIOS screen.