SlideShare a Scribd company logo
1 of 17
Enablement of HDD Password
using CCTK
Description of Task
Enablement of HDD(Hard disk drive) password on Dell client systems.

Prerequisites
Check the availability of Hard disk option in the Security section of F2 screen or by using “hddinfo” token
in CCTK.
Note :1. User should login as administrator mode to perform HDD password set/clear operation.
2. Current PPT will explain how to enable HDD password on a system.
3. This feature is supported on CCTK 2.2 onwards.
3. Below commands will provide necessary usage information on HDD password related CCTK tokens.
cctk -h hddinfo
cctk -h hddpwd
4. Below command can be used to set HDD Password for single or multiple HDD.
cctk –hddpwd=<password>
Step 1 Check for HDD in BIOS Setup. Check for Number of HDD availability in BIOS setup as below. For all HDD
available on the system we can set a unique password using CCTK.
BIOS screenshot of a system which as single HDD

BIOS screenshot of a system which as two HDD
Step 2 Check for --Hddinfo command usage in CCTK. This Command will provide the help information for the hddinfo
command in CCTK.
Step 3 Check for Number of HDD available: Number of available HDD’s on system can be checked by executing “cctk
--hddinfo” and check the Pwd-Protected field to check the password is set or not . (No-> Password is not set for HDD,
Yes-> Password is set for HDD)
Step 4 Help info to set a password for HDD: This Command will provide the help information to set HDD password
on the system.
Step 5 To Set HDD password using CCTK: Type the below command to set the password for HDD, after successful
command execution system will ask for restart(Please check the next slide for confirmation).
Step 6 Setting HDD password using CCTK: Type cctk.exe --hddinfo, check the status of Pending –restart field to
check restart is required or not (No-> Restart is not required, Yes-> Restart is required).
Step 7 After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command
execution (of step 4)and “Ignore“ option to undo the previous CCTK command operation(of step 4).
Select Modify Option from below pop up window
Step 8 After Selecting Modify operation(in Step 7) , SUT will restart and it will boot into OS ,Check the status
of the field “Pwd-Protected” in CCTK using hddinfo.
Step 9: Restart the system and enter the password in the pop-up window for HDD.
Step 10. Reboot the system ,enter to the F2 screen and check password set through CCTK command is reflected in
BIOS screen.
Scenario 2:
Step 11 Clearing HDD password Using CCTK : Syntax: cctk –hddpwd= <Blank space> --valsetuppwd=<Valid Password
which is Set >.
Step 12: Check the status of Pending-Restart field: Check the status of Pending-Restart field and reboot is required
for the changes to take effect (No-> Restart is not required, Yes-> Restart is required).
Step 13: After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command execution
(of step 12)and “Ignore“ option to undo the previous CCTK command operation(of step 12).
Select Modify Option from below pop up window
Step 14 Check the status of Pwd-Protected field. Check the status of Pwd-Protected field which indicate password is
cleared.
Step 15. Reboot the system enter to the F2 screen and check HDD password is not set is reflected in BIOS screen.

More Related Content

Viewers also liked

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
 
Softworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateSoftworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateEnterprise Softworx Solutions
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02ragibhasan
 
Abusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingAbusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingMarco Balduzzi
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов SmallKamchibekova Rakia
 
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
ОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октябряОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октября
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октябряАсылбек Айтматов
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in CloudSanoj Kumar
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)Marco Balduzzi
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...Marco Balduzzi
 
Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Venkatesh Prabhu
 
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)Marco Balduzzi
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
TUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMTUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMika aprilia
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime InvestigationsMarco Balduzzi
 

Viewers also liked (20)

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
Softworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation TemplateSoftworx Enterprise Asset Management 101 - Presentation Template
Softworx Enterprise Asset Management 101 - Presentation Template
 
600.412.Lecture02
600.412.Lecture02600.412.Lecture02
600.412.Lecture02
 
Family tree
Family treeFamily tree
Family tree
 
Possessive adjectives
Possessive adjectivesPossessive adjectives
Possessive adjectives
 
Abusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User ProfilingAbusing Social Networks for Automated User Profiling
Abusing Social Networks for Automated User Profiling
 
чынгыз айтматов Small
чынгыз айтматов Smallчынгыз айтматов Small
чынгыз айтматов Small
 
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
ОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октябряОО" Шоола Кол" презентация  Результаты поиска Санкт-Петербург  14 октября
ОО" Шоола Кол" презентация Результаты поиска Санкт-Петербург 14 октября
 
A New Form of Dos attack in Cloud
A New Form of Dos attack in CloudA New Form of Dos attack in Cloud
A New Form of Dos attack in Cloud
 
Why AIS is not always enough
Why AIS is not always enoughWhy AIS is not always enough
Why AIS is not always enough
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
 
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...
 
Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...Cloud computing security policy framework for mitigating denial of service at...
Cloud computing security policy framework for mitigating denial of service at...
 
Adauga un text
Adauga un textAdauga un text
Adauga un text
 
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Christmas
ChristmasChristmas
Christmas
 
TUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEMTUGAS PTI MOTHERBOARD DAN MODEM
TUGAS PTI MOTHERBOARD DAN MODEM
 
Presentation1
Presentation1Presentation1
Presentation1
 
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 HTTP(S)-Based Clustering for Assisted Cybercrime Investigations HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
HTTP(S)-Based Clustering for Assisted Cybercrime Investigations
 

Similar to Cctk support for setting hdd password

Dell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokensDell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokensartisriva
 
CCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokensCCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokensartisriva
 
Advanced Diagnostics 2
Advanced Diagnostics 2Advanced Diagnostics 2
Advanced Diagnostics 2Aero Plane
 
Copy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopCopy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopIT Tech
 
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告fm2008
 
Microsoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setupMicrosoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setupYan Vugenfirer
 
12040 pswdrec-2900xl
12040 pswdrec-2900xl12040 pswdrec-2900xl
12040 pswdrec-2900xlbasschuck2411
 
Router and switch basics configuration
Router and switch basics configurationRouter and switch basics configuration
Router and switch basics configurationMissangae
 
Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*Intel® Software
 
Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021Jian-Hong Pan
 
Armboot process zeelogic
Armboot process zeelogicArmboot process zeelogic
Armboot process zeelogicAleem Shariff
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course workIsmail Mukiibi
 
Optiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-usOptiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-usBk Rathi
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryRevolucion
 
Dual boot with a vhd final
Dual boot with a vhd finalDual boot with a vhd final
Dual boot with a vhd finalOsimondo
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...Symantec
 

Similar to Cctk support for setting hdd password (20)

Dell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokensDell Cctk support for newly added bios tokens
Dell Cctk support for newly added bios tokens
 
CCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokensCCTK2.2.1 support for newly added bios tokens
CCTK2.2.1 support for newly added bios tokens
 
Advanced Diagnostics 2
Advanced Diagnostics 2Advanced Diagnostics 2
Advanced Diagnostics 2
 
Copy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptopCopy and save a configuration file from a router or switch using a laptop
Copy and save a configuration file from a router or switch using a laptop
 
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
 
Microsoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setupMicrosoft Hardware Certification Kit (HCK) setup
Microsoft Hardware Certification Kit (HCK) setup
 
12040 pswdrec-2900xl
12040 pswdrec-2900xl12040 pswdrec-2900xl
12040 pswdrec-2900xl
 
BeagleBoard-xM Booting Process
BeagleBoard-xM Booting ProcessBeagleBoard-xM Booting Process
BeagleBoard-xM Booting Process
 
Router and switch basics configuration
Router and switch basics configurationRouter and switch basics configuration
Router and switch basics configuration
 
Osr506on esx
Osr506on esxOsr506on esx
Osr506on esx
 
Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*Provision Intel® Optane™ DC Persistent Memory in Linux*
Provision Intel® Optane™ DC Persistent Memory in Linux*
 
Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021Let's trace Linux Lernel with KGDB @ COSCUP 2021
Let's trace Linux Lernel with KGDB @ COSCUP 2021
 
Armboot process zeelogic
Armboot process zeelogicArmboot process zeelogic
Armboot process zeelogic
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 
Optiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-usOptiplex 380 service manual2-en-us
Optiplex 380 service manual2-en-us
 
StoreGrid : Restore & Recovery
StoreGrid : Restore & RecoveryStoreGrid : Restore & Recovery
StoreGrid : Restore & Recovery
 
Bitlocker configuration
Bitlocker configurationBitlocker configuration
Bitlocker configuration
 
Nvidia smi.1
Nvidia smi.1Nvidia smi.1
Nvidia smi.1
 
Dual boot with a vhd final
Dual boot with a vhd finalDual boot with a vhd final
Dual boot with a vhd final
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 

More from artisriva

Dcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokensDcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokensartisriva
 
Dcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokensDcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokensartisriva
 
Powershell dcpp
Powershell dcppPowershell dcpp
Powershell dcppartisriva
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
DCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokensDCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokensartisriva
 
DCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokensDCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokensartisriva
 
OMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensOMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensartisriva
 
Dell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcipDell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcipartisriva
 
Omci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokensOmci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokensartisriva
 
Linux training
Linux trainingLinux training
Linux trainingartisriva
 

More from artisriva (10)

Dcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokensDcc3 1(cctk)support for newly added bios tokens
Dcc3 1(cctk)support for newly added bios tokens
 
Dcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokensDcm9 1(omci)support for newly added bios tokens
Dcm9 1(omci)support for newly added bios tokens
 
Powershell dcpp
Powershell dcppPowershell dcpp
Powershell dcpp
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
DCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokensDCM 9.0(omci)support for newly added bios tokens
DCM 9.0(omci)support for newly added bios tokens
 
DCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokensDCC 3.0(cctk)support for newly added bios tokens
DCC 3.0(cctk)support for newly added bios tokens
 
OMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensOMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokens
 
Dell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcipDell biz client driver cab os deployment using sccm dcip
Dell biz client driver cab os deployment using sccm dcip
 
Omci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokensOmci8.2 support for newly added bios tokens
Omci8.2 support for newly added bios tokens
 
Linux training
Linux trainingLinux training
Linux training
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Cctk support for setting hdd password

  • 1. Enablement of HDD Password using CCTK
  • 2. Description of Task Enablement of HDD(Hard disk drive) password on Dell client systems. Prerequisites Check the availability of Hard disk option in the Security section of F2 screen or by using “hddinfo” token in CCTK. Note :1. User should login as administrator mode to perform HDD password set/clear operation. 2. Current PPT will explain how to enable HDD password on a system. 3. This feature is supported on CCTK 2.2 onwards. 3. Below commands will provide necessary usage information on HDD password related CCTK tokens. cctk -h hddinfo cctk -h hddpwd 4. Below command can be used to set HDD Password for single or multiple HDD. cctk –hddpwd=<password>
  • 3. Step 1 Check for HDD in BIOS Setup. Check for Number of HDD availability in BIOS setup as below. For all HDD available on the system we can set a unique password using CCTK. BIOS screenshot of a system which as single HDD BIOS screenshot of a system which as two HDD
  • 4. Step 2 Check for --Hddinfo command usage in CCTK. This Command will provide the help information for the hddinfo command in CCTK.
  • 5. Step 3 Check for Number of HDD available: Number of available HDD’s on system can be checked by executing “cctk --hddinfo” and check the Pwd-Protected field to check the password is set or not . (No-> Password is not set for HDD, Yes-> Password is set for HDD)
  • 6. Step 4 Help info to set a password for HDD: This Command will provide the help information to set HDD password on the system.
  • 7. Step 5 To Set HDD password using CCTK: Type the below command to set the password for HDD, after successful command execution system will ask for restart(Please check the next slide for confirmation).
  • 8. Step 6 Setting HDD password using CCTK: Type cctk.exe --hddinfo, check the status of Pending –restart field to check restart is required or not (No-> Restart is not required, Yes-> Restart is required).
  • 9. Step 7 After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command execution (of step 4)and “Ignore“ option to undo the previous CCTK command operation(of step 4). Select Modify Option from below pop up window
  • 10. Step 8 After Selecting Modify operation(in Step 7) , SUT will restart and it will boot into OS ,Check the status of the field “Pwd-Protected” in CCTK using hddinfo.
  • 11. Step 9: Restart the system and enter the password in the pop-up window for HDD.
  • 12. Step 10. Reboot the system ,enter to the F2 screen and check password set through CCTK command is reflected in BIOS screen.
  • 13. Scenario 2: Step 11 Clearing HDD password Using CCTK : Syntax: cctk –hddpwd= <Blank space> --valsetuppwd=<Valid Password which is Set >.
  • 14. Step 12: Check the status of Pending-Restart field: Check the status of Pending-Restart field and reboot is required for the changes to take effect (No-> Restart is not required, Yes-> Restart is required).
  • 15. Step 13: After restart select Modify / Ignore” Modify “option to take effect of previous CCTK command execution (of step 12)and “Ignore“ option to undo the previous CCTK command operation(of step 12). Select Modify Option from below pop up window
  • 16. Step 14 Check the status of Pwd-Protected field. Check the status of Pwd-Protected field which indicate password is cleared.
  • 17. Step 15. Reboot the system enter to the F2 screen and check HDD password is not set is reflected in BIOS screen.